Marmeus / mad-hypervLinks
Ansible + Vagrant + Hyper-V + Vulnerable AD π
β90Updated last year
Alternatives and similar repositories for mad-hyperv
Users that are interested in mad-hyperv are comparing it to the libraries listed below
Sorting:
- linikatz is a tool to attack AD on UNIXβ153Updated 2 years ago
- My Favorite Offensive Security Scriptsβ78Updated 7 months ago
- β103Updated 10 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusingβ¦β105Updated 2 years ago
- β99Updated 3 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails cβ¦β166Updated last year
- Just some random Red Team Scripts that can be usefulβ153Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.β45Updated 4 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automationβ184Updated last year
- C2 Automation using Linodeβ85Updated 3 years ago
- The most average C2 ever (MACE)β97Updated 3 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the wβ¦β138Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movementβ181Updated 7 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It empβ¦β78Updated 3 months ago
- β106Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.β100Updated 4 months ago
- β120Updated 6 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snafflerβ114Updated 5 months ago
- Easy red team phishing with Puppeteerβ134Updated 2 years ago
- A community-driven collection of BloodHound queriesβ157Updated 2 months ago
- Modules for my C2 course students to use for their own projects.β74Updated 2 years ago
- Generate graphs and charts based on password cracking resultβ162Updated 2 years ago
- A collection of tools that I use in CTF's or for assessmentsβ103Updated 10 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatinβ¦β120Updated 11 months ago
- Powershell tools used for Red Team / Pentesting.β79Updated last year
- Lord Of Active Directory - automatic vulnerable active directory on AWSβ147Updated 2 years ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkitβ162Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2β¦β84Updated 2 years ago
- PowerShell Reverse Shellβ79Updated 2 years ago
- β52Updated last year