alebov / AD-labLinks
An active directory laboratory for penetration testing.
☆139Updated 4 years ago
Alternatives and similar repositories for AD-lab
Users that are interested in AD-lab are comparing it to the libraries listed below
Sorting:
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆175Updated 5 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆221Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆157Updated 2 years ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆172Updated 2 months ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆211Updated 2 years ago
- Active Directory Lab for Penetration Testing☆52Updated 2 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆492Updated 2 years ago
- Azure AD cheatsheet for the CARTP course☆133Updated 3 years ago
- ☆80Updated 5 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆362Updated 3 months ago
- ☆122Updated last year
- PEN-300/OSEP Public resources for PEN-300 Training☆116Updated 4 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆236Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆323Updated 2 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257Updated 3 years ago
- ☆166Updated 2 years ago
- SpecterOps Presentations☆209Updated 2 months ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- ☆101Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆469Updated last year
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆258Updated 3 years ago
- Infrastructure Automation☆355Updated last year
- ☆117Updated 4 years ago
- Some scripts to abuse kerberos using Powershell☆343Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆444Updated 2 years ago
- ☆64Updated 4 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago