RedTeamOperations / Vulnerable_Machine
This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.
☆111Updated 5 years ago
Alternatives and similar repositories for Vulnerable_Machine
Users that are interested in Vulnerable_Machine are comparing it to the libraries listed below
Sorting:
- List of red team resources☆94Updated 7 years ago
- ☆104Updated 5 years ago
- Practice Labs☆90Updated 4 years ago
- ☆66Updated 3 years ago
- Active Directory Wordlists☆94Updated 4 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆151Updated 2 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- A collection of commands and tools used for conducting enumeration during my OSCP journey☆112Updated 4 years ago
- Windows for Red Teamers☆126Updated 3 years ago
- ☆105Updated 2 years ago
- Notes compiled for the OSCP exam.☆152Updated 3 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆211Updated 2 years ago
- ☆197Updated 3 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated 2 years ago
- Powershell script to extract information from boot PXE☆139Updated 6 years ago
- Active Directory Labs/exams Review☆252Updated 4 years ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆377Updated 4 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆201Updated 9 months ago
- Write-Ups for HackTheBox☆104Updated last year
- OSCP notes☆53Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- You don't need wires to be connected☆40Updated 5 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆215Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆208Updated 5 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 6 years ago
- ☆55Updated 6 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆143Updated last year
- ☆81Updated 5 years ago