Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, groups objects, GPOs and network shares required. It also adds ASREProast account, kerberoastable account, and misconfigured ACLs to the domain for testing purposes
☆39Jan 1, 2022Updated 4 years ago
Alternatives and similar repositories for PopulateActiveDirectory
Users that are interested in PopulateActiveDirectory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- Collection of ISE Menu Add-Ons that I have written☆13Jul 20, 2016Updated 9 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- A simple Powershell Module to help people managing Active Directory Shadow Group☆15May 15, 2019Updated 6 years ago
- ☆18Feb 2, 2026Updated last month
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- AzureKitty is an Office 365 and Azure configuration audit tool☆15Jan 28, 2024Updated 2 years ago
- A PowerShell wrapper for certutil.exe☆20Updated this week
- PowerShell Module to find compatible FIDO2 keys for Entra☆18Updated this week
- Repository for Ludus french templates☆23Mar 1, 2026Updated 3 weeks ago
- ☆11Sep 14, 2022Updated 3 years ago
- Tier0 (Tier Zero) Account discovery for ActiveDirectory Security☆17Apr 11, 2018Updated 7 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated 2 months ago
- Root module for creating Tier Model / Delegation Model on Active Directory☆20Aug 28, 2025Updated 6 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Jun 12, 2024Updated last year
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 3 months ago
- ☆16Jul 5, 2017Updated 8 years ago
- ☆23Jan 21, 2025Updated last year
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- payMe is a technical solution initiated by some concerned Nigerians aimed to catalyze the innate desire in humans to fairly compete in an…☆14Nov 30, 2022Updated 3 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- A Laravel package to streamline development and testing by allowing quick login as any User 🪄. Adds a configurable route to login with a…☆10Dec 31, 2024Updated last year
- ☆57Nov 18, 2025Updated 4 months ago
- Module for creating Active Directory ACLs - Delegation made easy☆23Dec 16, 2022Updated 3 years ago
- A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆27May 28, 2025Updated 9 months ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- ☆49Mar 12, 2026Updated last week
- Indicators of compromise☆17Jan 29, 2026Updated last month
- Exemplo de API REST para contagem de acessos criada com .NET 7 ASP.NET Core, com uso do comando dotnet user-jwts create para geração de J…☆10Apr 25, 2023Updated 2 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago