badsectorlabs / ludusLinks
[GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.
☆85Updated this week
Alternatives and similar repositories for ludus
Users that are interested in ludus are comparing it to the libraries listed below
Sorting:
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated last month
- C2 Automation using Linode☆82Updated 2 years ago
- ☆105Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆113Updated last year
- ☆73Updated this week
- An Ansible collection that installs an SCCM deployment with optional configurations.☆87Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆120Updated last week
- ☆203Updated last month
- Artifact monitoring that ensures fairplay☆75Updated 6 months ago
- Living off the land searches for explorer and sharepoint☆89Updated 3 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated last week
- BloodHound PowerShell client☆57Updated 2 weeks ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆226Updated 2 weeks ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 9 months ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆70Updated 4 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆89Updated 11 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆130Updated 6 months ago
- ☆150Updated last month
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆42Updated 6 months ago
- Hybrid AD utilities for ROADtools☆83Updated 2 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 7 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆190Updated 10 months ago
- LDAP Querying without the Suck☆109Updated 8 months ago
- ☆147Updated 4 months ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆67Updated 8 months ago
- 🌩️ Collection of BloodHound queries for Azure☆75Updated 6 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago