Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
☆187Mar 1, 2023Updated 3 years ago
Alternatives and similar repositories for vulnerable-AD-plus
Users that are interested in vulnerable-AD-plus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,264Apr 12, 2024Updated last year
- game of active directory☆7,610Mar 12, 2026Updated last week
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆150Oct 21, 2023Updated 2 years ago
- Lab used for workshop and CTF☆508Feb 3, 2026Updated last month
- ☆32Jun 1, 2024Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆316Feb 16, 2026Updated last month
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,227Jun 7, 2023Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 10 months ago
- List of some AD tools I frequently use☆56Nov 2, 2025Updated 4 months ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,495Updated this week
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆123Jan 15, 2025Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆640May 8, 2025Updated 10 months ago
- A tool to help query AD via the LDAP protocol☆614Sep 25, 2024Updated last year
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆182Apr 10, 2025Updated 11 months ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆303Jan 20, 2026Updated 2 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Mar 12, 2026Updated last week
- Active Directory Labs/exams Review☆262Mar 18, 2021Updated 5 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,117Jun 10, 2024Updated last year
- ☆335Sep 21, 2025Updated 6 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆103Apr 27, 2025Updated 10 months ago
- Active Directory Auditing and Enumeration☆521Dec 3, 2025Updated 3 months ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,420Jul 27, 2025Updated 7 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆102Aug 14, 2025Updated 7 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆501Jan 23, 2023Updated 3 years ago
- Active Directory Authentication Library☆90Nov 7, 2025Updated 4 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆786Updated this week
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- ☆53Sep 23, 2025Updated 6 months ago
- EDRSandblast-GodFault☆271Aug 28, 2023Updated 2 years ago
- ☆895Mar 17, 2026Updated last week
- A BloodHound collector for Microsoft Configuration Manager☆393Jul 7, 2025Updated 8 months ago
- a tool to help operate in EDRs' blind spots☆769Dec 2, 2024Updated last year
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆64Jan 2, 2025Updated last year
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆701May 7, 2025Updated 10 months ago