M507 / Vulnerable-AD-Lab
Automate the build of a vulnerable AD environment.
☆36Updated 2 years ago
Alternatives and similar repositories for Vulnerable-AD-Lab
Users that are interested in Vulnerable-AD-Lab are comparing it to the libraries listed below
Sorting:
- InfoSec Notes☆56Updated last year
- ☆40Updated 2 years ago
- ☆64Updated last week
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆93Updated 2 years ago
- ☆22Updated 3 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated 10 months ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.☆64Updated 3 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆31Updated 3 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆44Updated 2 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆89Updated 11 months ago
- Resources for AD penetration testing and security☆30Updated 3 years ago
- This repo will contain some basic pentest/RT commands.☆37Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 6 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last month
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆19Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆13Updated last month
- Windows Post-Exploitation tools wrapper☆12Updated 10 months ago