Automated Active Directory lab running on Proxmox
☆88Aug 8, 2025Updated 6 months ago
Alternatives and similar repositories for ad-training-lab
Users that are interested in ad-training-lab are comparing it to the libraries listed below
Sorting:
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆109Jan 3, 2022Updated 4 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- ☆19Sep 18, 2023Updated 2 years ago
- ☆20Sep 24, 2025Updated 5 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- ☆13Apr 25, 2024Updated last year
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 3 weeks ago
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- ☆28Sep 9, 2024Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Dec 7, 2024Updated last year
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆70Feb 3, 2024Updated 2 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 11 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆219Sep 4, 2025Updated 5 months ago
- Generate Shellcode Loaders & Injects☆159May 15, 2023Updated 2 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated 3 weeks ago
- CIS & Azure Security Center Hardening recommendations implemented in PowerShell DSC from Azure Automation☆34Jun 10, 2021Updated 4 years ago
- Repo for all my exploits/PoCs☆52May 6, 2025Updated 9 months ago
- Tools for attacking Azure Function Apps☆88Oct 28, 2025Updated 4 months ago
- ☆41Mar 12, 2025Updated 11 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆149Jun 5, 2025Updated 8 months ago
- shellcode loader for your evasion needs☆352Apr 30, 2025Updated 10 months ago
- CVE-2025-1974☆90Apr 2, 2025Updated 10 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆123Jan 15, 2025Updated last year