A walkthrough on how I set up Microsoft Server 2019 on a Virtual Machine to run Active Directory on it. I then configure a Domain Controller that will allow me to run a domain. After that I ran a Powershell script to create over 1000 users in Active Directory and log into those newly created accounts on another client that uses the domain I set …
☆63Mar 24, 2023Updated 2 years ago
Alternatives and similar repositories for ActiveDirectoryLab
Users that are interested in ActiveDirectoryLab are comparing it to the libraries listed below
Sorting:
- ☆15May 17, 2018Updated 7 years ago
- ☆26Apr 1, 2022Updated 3 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Jul 6, 2020Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- This is the Network Flow Generator for ICSSIM☆17Aug 28, 2025Updated 6 months ago
- (WIP) CIS Microsoft Azure Foundations Benchmark☆17Dec 14, 2025Updated 3 months ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆17Jun 23, 2021Updated 4 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- PGT allows you to generate pcaps using python without touching the network in any way. It is dependent upon scapy.☆29Jan 3, 2022Updated 4 years ago
- HomeLab Setup with a Firewall, SIEM Solution, Exploitable machines and Attacker.☆31Jul 20, 2022Updated 3 years ago
- ☆22Feb 3, 2026Updated last month
- Mr.Robot - DIY Self Balancing Robot Project☆10Oct 25, 2017Updated 8 years ago
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆75Feb 27, 2026Updated 3 weeks ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆45Mar 5, 2026Updated 2 weeks ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 8 months ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆18Updated this week
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆23Nov 8, 2019Updated 6 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Sep 20, 2021Updated 4 years ago
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆39Oct 30, 2024Updated last year
- PowerShell Module for Brickset Lego data☆11Sep 9, 2024Updated last year
- Report and finding templates used by the Serpico reporting tool☆16Sep 26, 2018Updated 7 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- Command line utility for accessing ANS services/APIs☆11Feb 26, 2026Updated 3 weeks ago
- ☆19Aug 20, 2017Updated 8 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A minimalist Hugo theme that helps you build fully responsive documentation websites for small projects.☆10Oct 19, 2021Updated 4 years ago
- ☆11Mar 29, 2022Updated 3 years ago
- ☆24Feb 1, 2025Updated last year
- ☆15Dec 7, 2022Updated 3 years ago
- All the curriculum for a BS in electrical engineering but online and free.☆33Aug 25, 2024Updated last year
- Windows Privilege Escalation☆30Aug 14, 2020Updated 5 years ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆22Aug 26, 2023Updated 2 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year