AD Lab Setup Scripts
☆81May 13, 2025Updated 10 months ago
Alternatives and similar repositories for ad-lab-scripts
Users that are interested in ad-lab-scripts are comparing it to the libraries listed below
Sorting:
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- Precompiled binaries for windows & Linux☆33Jun 11, 2025Updated 9 months ago
- A Python Library designed to facilitate interaction with Synack's undocumented API endpoints☆25Mar 4, 2025Updated last year
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated last year
- A tool written in both bash and python to parse doc/ drive links and collect secrets in those :)☆18Jul 7, 2022Updated 3 years ago
- Show PIM role to solve a task - and group to activate the needed permission☆15May 22, 2025Updated 10 months ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- AI-based Ludus range configuration builder☆29May 6, 2025Updated 10 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆121Nov 5, 2025Updated 4 months ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- Extendable Cyber Range Framework that easily deploys scenarios that aim to improve the knowledge of the cyber defense workforce. It uses …☆40Apr 5, 2024Updated last year
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- ☆20Apr 9, 2024Updated last year
- Slowloris HTTP DoS RSnake☆23Apr 2, 2016Updated 9 years ago
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- A compendium of threat modeling and security testing resources for LLMs and GenAI agents☆18Oct 16, 2024Updated last year
- Red AI Archive: Jeff Sims - A curated collection of work in AI safety, cybersecurity data science, and AI red teaming – my own research a…☆26Apr 1, 2025Updated 11 months ago
- Ansible Role for Ludus to provision or remove a device to/from a Tailnet.☆14Dec 5, 2025Updated 3 months ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆28Feb 4, 2026Updated last month
- PurpleCrew based on CrewAI with AI agents☆18May 1, 2025Updated 10 months ago
- ☆49Mar 12, 2026Updated last week
- ☆11Jun 30, 2025Updated 8 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆10Jul 14, 2021Updated 4 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- ☆22Apr 11, 2025Updated 11 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆68Mar 17, 2025Updated last year
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆19Updated this week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Oct 28, 2023Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Jul 19, 2024Updated last year
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆152Feb 25, 2025Updated last year