M507 / Vulnerable-AD-Lab
Automate the build of a vulnerable AD environment.
☆36Updated 2 years ago
Alternatives and similar repositories for Vulnerable-AD-Lab:
Users that are interested in Vulnerable-AD-Lab are comparing it to the libraries listed below
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated 9 months ago
- ☆41Updated 2 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- InfoSec Notes☆56Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- This repo will contain some basic pentest/RT commands.☆37Updated 2 years ago
- ☆22Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆87Updated 9 months ago
- ☆28Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆40Updated 2 years ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated last year
- Resources for AD penetration testing and security☆30Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆19Updated 2 years ago
- ☆37Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆92Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆47Updated 3 years ago
- ☆47Updated 2 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆21Updated 3 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- ☆41Updated 4 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 3 years ago