Marmeus / mad-hypervLinks
Ansible + Vagrant + Hyper-V + Vulnerable AD π
β93Updated 11 months ago
Alternatives and similar repositories for mad-hyperv
Users that are interested in mad-hyperv are comparing it to the libraries listed below
Sorting:
- linikatz is a tool to attack AD on UNIXβ149Updated last year
- My Favorite Offensive Security Scriptsβ74Updated 3 months ago
- β95Updated 2 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β104Updated last year
- β105Updated 10 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails cβ¦β167Updated 9 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movementβ174Updated 2 months ago
- The most average C2 ever (MACE)β96Updated 3 years ago
- Just some random Red Team Scripts that can be usefulβ152Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.β44Updated this week
- Tool for enumerating Active Directory environmentsβ47Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automationβ176Updated last year
- β86Updated 5 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.β94Updated 2 years ago
- β111Updated 2 months ago
- Powershell tools used for Red Team / Pentesting.β78Updated last year
- C2 Automation using Linodeβ82Updated 2 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It empβ¦β75Updated 5 months ago
- A collection of tools that I use in CTF's or for assessmentsβ102Updated 6 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It prβ¦β105Updated 4 months ago
- β105Updated last year
- β51Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the wβ¦β133Updated last year
- β150Updated last month
- A community-driven collection of BloodHound queriesβ104Updated last month
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatinβ¦β113Updated 6 months ago
- Generate graphs and charts based on password cracking resultβ163Updated 2 years ago
- Easy red team phishing with Puppeteerβ131Updated 2 years ago
- β170Updated 3 months ago
- Cortex XDR Config Extractorβ132Updated 2 years ago