This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.
☆128Jun 30, 2019Updated 6 years ago
Alternatives and similar repositories for Vulnerable_Machine
Users that are interested in Vulnerable_Machine are comparing it to the libraries listed below
Sorting:
- Network Pivoting Toolkit☆457Aug 26, 2023Updated 2 years ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆23Jun 13, 2023Updated 2 years ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆27Nov 11, 2022Updated 3 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆26May 28, 2021Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Nov 3, 2022Updated 3 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆19Mar 22, 2019Updated 7 years ago
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- Windows privilege escalation with cmd☆90Dec 13, 2021Updated 4 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- ☆13Dec 12, 2022Updated 3 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated 11 months ago
- ☆11Feb 22, 2022Updated 4 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Mar 12, 2026Updated last week
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,161Jan 9, 2021Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆2,058Oct 9, 2022Updated 3 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- My personal blog☆14Mar 14, 2026Updated last week
- A list of the books that I am reading, with priorities.☆35May 1, 2022Updated 3 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 9 years ago
- ☆10May 20, 2020Updated 5 years ago
- 内存分析中玩贪吃蛇☆16Jan 13, 2024Updated 2 years ago
- Notes I made while preparing for the CRTP certification exam☆13Jul 1, 2021Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Jan 5, 2022Updated 4 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Oct 2, 2016Updated 9 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Sep 30, 2019Updated 6 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- ☆777Oct 17, 2023Updated 2 years ago
- brownie port of damn vulnerable defi☆14Feb 3, 2022Updated 4 years ago