Automate the build of a vulnerable AD environment.
☆41Aug 19, 2022Updated 3 years ago
Alternatives and similar repositories for Vulnerable-AD-Lab
Users that are interested in Vulnerable-AD-Lab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481☆16Apr 19, 2024Updated 2 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 4 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆26Oct 2, 2021Updated 4 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 10 months ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 6 years ago
- Linux rust keylogger☆17Mar 1, 2024Updated 2 years ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆24Jun 13, 2023Updated 2 years ago
- Notes on Preparing for Offsec☆28Jul 24, 2023Updated 2 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆29Mar 8, 2023Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 4 months ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- ☆13Jan 28, 2024Updated 2 years ago
- Precompiled binaries for various projects☆13Nov 6, 2020Updated 5 years ago
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and a…☆310Apr 4, 2026Updated 3 weeks ago
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆83Jun 1, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆41May 22, 2024Updated last year
- AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innov…☆27Mar 12, 2025Updated last year
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 2 months ago
- PoC BSOD for CVE-2020-16898 (badneighbor)☆22Oct 16, 2020Updated 5 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆20Jun 30, 2023Updated 2 years ago
- ☆36Mar 28, 2025Updated last year
- OSWE Preparation☆38May 28, 2019Updated 6 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- ☆11Dec 7, 2025Updated 4 months ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆177Jul 7, 2025Updated 9 months ago