UNT-CAS / Vagrant-AD-LabLinks
Multi Vagrant environment with Active Directory
☆12Updated 7 years ago
Alternatives and similar repositories for Vagrant-AD-Lab
Users that are interested in Vagrant-AD-Lab are comparing it to the libraries listed below
Sorting:
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- Helpful operator notes and techniques in actionable form☆17Updated last year
- ☆41Updated 6 years ago
- Continuous kerberoast monitor☆45Updated last year
- A parser to extract information from .nessus file format☆23Updated 4 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆61Updated 6 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆63Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- ☆12Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated last year
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Hunting for Microsoft Exchange the LDAP Way.☆35Updated 5 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- C# User Simulation☆32Updated 2 years ago
- ☆16Updated 7 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- An async Python client library for Empire's RESTful API☆25Updated last year
- A simple bastion host setup designed for cloud-hosted lab environments.☆28Updated 4 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆25Updated 3 years ago
- Walking the PEB in VBA☆24Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆36Updated 9 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago