Automate the build of a vulnerable AD environment.
☆41Aug 19, 2022Updated 3 years ago
Alternatives and similar repositories for Vulnerable-AD-Lab
Users that are interested in Vulnerable-AD-Lab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481☆16Apr 19, 2024Updated last year
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 4 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆27Oct 2, 2021Updated 4 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 9 months ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 6 years ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆23Jun 13, 2023Updated 2 years ago
- Notes on Preparing for Offsec☆28Jul 24, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 4 months ago
- Precompiled binaries for various projects☆13Nov 6, 2020Updated 5 years ago
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that are useful for internal penetration tests and a…☆305Apr 4, 2026Updated last week
- Generate AES128/256 Kerberos keys for an AD account using a plaintext password and Python3☆80Jun 1, 2022Updated 3 years ago
- ☆41May 22, 2024Updated last year
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- BYOVD Technique Example using viragt64 driver☆80Jul 25, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PoC BSOD for CVE-2020-16898 (badneighbor)☆22Oct 16, 2020Updated 5 years ago
- My Leetcode Problems' Solutions☆11Sep 7, 2023Updated 2 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- ☆36Mar 28, 2025Updated last year
- ☆11Feb 7, 2023Updated 3 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- ☆11Dec 7, 2025Updated 4 months ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆177Jul 7, 2025Updated 9 months ago
- 根据域名生成备份文件字典(不扫描)☆23Feb 14, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Kerberos Haters Guide to Zeek Threat Hunting☆34Oct 14, 2021Updated 4 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Get Windows Process List in Rust☆10May 4, 2022Updated 3 years ago
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Sep 30, 2019Updated 6 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆44Jul 13, 2023Updated 2 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆102Aug 27, 2025Updated 7 months ago