Automate the build of a vulnerable AD environment.
☆41Aug 19, 2022Updated 3 years ago
Alternatives and similar repositories for Vulnerable-AD-Lab
Users that are interested in Vulnerable-AD-Lab are comparing it to the libraries listed below
Sorting:
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆27Oct 2, 2021Updated 4 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 8 months ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- Linux rust keylogger☆18Mar 1, 2024Updated 2 years ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆23Jun 13, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆28Mar 8, 2023Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 3 months ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- ☆13Jan 28, 2024Updated 2 years ago
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and a…☆302Jan 1, 2026Updated 2 months ago
- Precompiled binaries for various projects☆13Nov 6, 2020Updated 5 years ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆81Jun 1, 2022Updated 3 years ago
- A crypto-programming language including an IDE☆12Feb 12, 2025Updated last year
- ☆18Oct 8, 2024Updated last year
- BYOVD Technique Example using viragt64 driver☆78Jul 25, 2024Updated last year
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆20Mar 7, 2026Updated 2 weeks ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- Simple reverse shell to avoid Windows defender and kaspersky detection☆21Dec 20, 2021Updated 4 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated last month
- PoC BSOD for CVE-2020-16898 (badneighbor)☆21Oct 16, 2020Updated 5 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jul 5, 2022Updated 3 years ago
- OSWE Preparation☆38May 28, 2019Updated 6 years ago
- Another World/Out of This World engine reimplementation (with debugger)☆27Aug 13, 2025Updated 7 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- ☆11Dec 7, 2025Updated 3 months ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆176Jul 7, 2025Updated 8 months ago
- Free and Open-Source Chatbot Platform powered by .NET Core 3.0 and Blazor!☆14Nov 21, 2020Updated 5 years ago