badsectorlabs / ludus_adcsView external linksLinks
An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.
☆17Jan 22, 2026Updated 3 weeks ago
Alternatives and similar repositories for ludus_adcs
Users that are interested in ludus_adcs are comparing it to the libraries listed below
Sorting:
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- A comprehensive list of usable Entra ID first-party clients with pre-consented Microsoft Graph scopes, in a simple YAML-file explorable w…☆147Nov 16, 2025Updated 2 months ago
- ☆43Jul 17, 2025Updated 6 months ago
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆38May 17, 2025Updated 8 months ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆57Jul 2, 2025Updated 7 months ago
- Remote Template Injection Toolkit☆48Apr 7, 2024Updated last year
- Bunch of BOF files☆38Jun 30, 2025Updated 7 months ago
- Password spraying tool for Microsoft Online accounts (Entra/Azure/O365)☆67Mar 20, 2024Updated last year
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆45Jul 6, 2025Updated 7 months ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Info on how to use Kerberos KDC on a non-domain joined host☆53Jul 31, 2024Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated 10 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆68Feb 6, 2026Updated last week
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- PowerShell script to disable NetBIOS on Windows☆12Jul 19, 2021Updated 4 years ago
- Scripts to enumerate and report on Entra Conditional Access☆41Sep 5, 2025Updated 5 months ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 6 months ago
- ☆16Updated this week
- Administrative Template (ADMX) for Microsoft Defender Attack Surface Reduction (ASR)☆13Jul 7, 2025Updated 7 months ago
- ☆18Jan 26, 2026Updated 2 weeks ago
- Honeypot detection toolkit☆12Dec 28, 2025Updated last month
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- Restoring some of my older tools to the web☆11Oct 18, 2024Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Repository for Invoke-EntraIDPimElevations script on PowerShell Gallery.☆12Feb 19, 2024Updated last year
- ☆12Aug 20, 2022Updated 3 years ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆66Mar 17, 2025Updated 10 months ago
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Dec 1, 2025Updated 2 months ago
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆40Jan 31, 2026Updated last week
- Utilizing MMF as a execution space for shell code☆10Aug 28, 2018Updated 7 years ago
- Crosswalk Nessus findings with the CISA Known and Exploited Vulnerabilities (KEV) catalog.☆12Mar 21, 2023Updated 2 years ago