Multi Vagrant environment with Active Directory
☆14Jun 29, 2018Updated 7 years ago
Alternatives and similar repositories for Vagrant-AD-Lab
Users that are interested in Vagrant-AD-Lab are comparing it to the libraries listed below
Sorting:
- ☆12Apr 21, 2019Updated 6 years ago
- Scrape valid media URLs from the Epstein Library☆24Feb 9, 2026Updated last month
- Сlone of POLE - portable library for structured storage.☆11Apr 25, 2018Updated 7 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- NoSQL Injection Demo Application☆13Oct 18, 2013Updated 12 years ago
- PHDAYS |||☆17May 23, 2013Updated 12 years ago
- Using Microsoft Visual Studio 2019 Building A LLVM Out-Source-Tree Pass☆17Apr 30, 2020Updated 5 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- Zeek network security monitor plugin that enables parsing of the Ethernet/IP and Common Industrial Protocol standards☆46May 30, 2024Updated last year
- An Unreal Inventory and Item System☆14Nov 16, 2023Updated 2 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- A python metamorphic engine for PE/PE+ files.☆15Jan 1, 2023Updated 3 years ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- uploads unlimited files to mega.nz without a subscription☆12Updated this week
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- Wireshark dissector for GE-FANUC Service Request Transfer Protocol☆11Jan 7, 2023Updated 3 years ago
- A BACnet layer for Scapy☆13Nov 25, 2015Updated 10 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- CAN interface for Raspberry Pi Zero☆12Aug 26, 2017Updated 8 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- MCP server for intelligent code search: semantic (RAG), symbolic (tree-sitter), and regex (ripgrep) search modes. Built for Claude Code a…☆16Sep 12, 2025Updated 6 months ago
- This web application built using Django can be used to read and view pcap files on servers using a web browser☆11May 15, 2017Updated 8 years ago
- Collection of shellcode injection and execution techniques☆18Updated this week
- ☆20Nov 6, 2024Updated last year
- Command line utility to remove exact duplicate files.☆12Nov 24, 2018Updated 7 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- ChatGPT-like chat bot webapp built with React, Express and TailwindCSS using ollama.ai as backend.☆13Nov 23, 2023Updated 2 years ago
- Repository for my ATT&CK analysis research.☆70May 16, 2019Updated 6 years ago
- Arduino support for the MAX2870 Wideband Frequency Synthesizer chip from Maxim☆16Dec 16, 2023Updated 2 years ago