Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, groups objects, GPOs and network shares required. It also adds ASREProast account, kerberoastable account, and misconfigured ACLs to the domain for testing purposes
☆39Jan 1, 2022Updated 4 years ago
Alternatives and similar repositories for PopulateActiveDirectory
Users that are interested in PopulateActiveDirectory are comparing it to the libraries listed below
Sorting:
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- Netcap Tensorflow Deep Neural Network☆15Apr 26, 2020Updated 5 years ago
- PowerShell module to manage domain controllers & initial domain deployments☆13Oct 31, 2025Updated 4 months ago
- ☆12Aug 22, 2017Updated 8 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- A PowerShell wrapper for certutil.exe☆20Feb 21, 2026Updated last week
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- A privacy focused, Chromium browser for web scraping. Built with Tor and PySide6 (a QT framework).☆10Mar 13, 2023Updated 2 years ago
- Repository for Ludus french templates☆21Updated this week
- Automated assessment of 51 CIS 365 Foundations v3.0.0 benchmark safeguards.☆13Apr 21, 2025Updated 10 months ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 2 months ago
- PowerShell Module to find compatible FIDO2 keys for Entra☆18Updated this week
- A simple Powershell Module to help people managing Active Directory Shadow Group☆15May 15, 2019Updated 6 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- AzureKitty is an Office 365 and Azure configuration audit tool☆15Jan 28, 2024Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Tier0 (Tier Zero) Account discovery for ActiveDirectory Security☆17Apr 11, 2018Updated 7 years ago
- Root module for creating Tier Model / Delegation Model on Active Directory☆20Aug 28, 2025Updated 6 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆117Jun 12, 2024Updated last year
- ☆18Feb 2, 2026Updated last month
- ☆18Jan 9, 2026Updated last month
- Workshop Materials from DEFCON 25 (7/27/2017)☆22Jul 31, 2017Updated 8 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- ☆23Jan 21, 2025Updated last year
- ☆49Feb 12, 2026Updated 2 weeks ago
- Module for creating Active Directory ACLs - Delegation made easy☆22Dec 16, 2022Updated 3 years ago
- Outil de récupération automatique des données AZure / Automated tool for dumping Azure configuration data☆21Nov 13, 2025Updated 3 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated 3 weeks ago
- Automating Employee Onboarding with Power Automate☆14Jul 20, 2025Updated 7 months ago
- ☆19Oct 30, 2020Updated 5 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- ☆55Nov 18, 2025Updated 3 months ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- Landing Page Content/Builder for MITRE Security Automation Framework☆29Oct 21, 2025Updated 4 months ago
- Collection of scripts to extract Azure resource information to support security compliance audit.☆22Jan 18, 2022Updated 4 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago