Ansible + Vagrant + Hyper-V + Vulnerable AD π
β91Aug 11, 2024Updated last year
Alternatives and similar repositories for mad-hyperv
Users that are interested in mad-hyperv are comparing it to the libraries listed below
Sorting:
- β37Feb 11, 2023Updated 3 years ago
- .NET port of Leron Gray's azbelt tool.β26Sep 21, 2023Updated 2 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & directorβ¦β11Mar 31, 2023Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Feb 12, 2023Updated 3 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.β55Apr 4, 2023Updated 2 years ago
- Azure APIs enumeration and abuseβ13Updated this week
- A tool to create randomly insecure file shares that also contain unsecured credential filesβ49Feb 16, 2026Updated 2 weeks ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online personaβ¦β18Oct 16, 2024Updated last year
- Tool for efficient directory enumerationβ65Jan 27, 2026Updated last month
- idk man this was the default github nameβ35Apr 23, 2023Updated 2 years ago
- Parser and reconciliation tooling for large Active Directory environments.β33Feb 18, 2025Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.β67Mar 27, 2023Updated 2 years ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.β19Jun 20, 2025Updated 8 months ago
- β27May 1, 2023Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.β52Jul 15, 2023Updated 2 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.β69Jul 14, 2023Updated 2 years ago
- β83Nov 1, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL packageβ35Mar 28, 2023Updated 2 years ago
- Ask a TGS on behalf of another user without passwordβ482Mar 30, 2025Updated 11 months ago
- CVE-2013-4786 Go exploitation toolβ40Nov 18, 2025Updated 3 months ago
- Maltego Transforms for generating screenshots from Websites and URLsβ16Apr 24, 2023Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.β55Dec 6, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Frameworkβ22Jun 11, 2022Updated 3 years ago
- β223Mar 10, 2024Updated last year
- in-process powershell runner for BRC4β48Oct 31, 2023Updated 2 years ago
- A pure C version of SymProcAddressβ30Mar 17, 2024Updated last year
- A Red Teaming tool focused on profiling the target.β29Jan 10, 2026Updated last month
- A simple pentest container equipped with common python pentest tools.β42Jan 30, 2026Updated last month
- DFSCoerce exe revisited version with custom authenticationβ42Jan 13, 2024Updated 2 years ago
- β44Jul 5, 2024Updated last year
- A python port of CCob's ThreadlessInjectβ25Mar 18, 2023Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suiteβ40Apr 3, 2023Updated 2 years ago
- β47Feb 11, 2023Updated 3 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.β108Sep 22, 2023Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets oβ¦β17Apr 6, 2023Updated 2 years ago
- β46Oct 27, 2023Updated 2 years ago
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improveβ¦β37Jul 31, 2023Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.β53Jul 25, 2023Updated 2 years ago
- β28Mar 31, 2023Updated 2 years ago