d1r7b46 / DERP-GeneratorLinks
☆11Updated 8 months ago
Alternatives and similar repositories for DERP-Generator
Users that are interested in DERP-Generator are comparing it to the libraries listed below
Sorting:
- List of tools and resources for pentesting Microsoft Active Directory☆74Updated 3 weeks ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆168Updated 7 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- AD Lab Setup Scripts☆74Updated last month
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆232Updated 3 weeks ago
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 3 months ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆144Updated last year
- Retired TrustedSec Capabilities☆247Updated 7 months ago
- ☆51Updated last year
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆14Updated 5 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance.☆197Updated 7 months ago
- Internal Network Penetration Test Playbook☆16Updated 3 years ago
- Completely Risky Active-Directory Simulation Hub☆101Updated last year
- ☆169Updated 2 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆143Updated 4 months ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆104Updated last year
- Most of the notes, resources and scripts I used to prepare for the OSCP and pass it the first time.☆77Updated 2 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆211Updated 2 years ago
- Personal notes used to pass the OSWP exam☆83Updated 2 years ago
- This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.☆53Updated last month
- User Enumeration of Microsoft Teams users via API☆159Updated last year
- A list of the best cybersecurity research related blogs.☆28Updated last month
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆286Updated 5 months ago
- ☆16Updated 8 months ago
- ☆178Updated 6 months ago
- ☆16Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆195Updated 3 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆153Updated 2 years ago
- Azure mindmap for penetration tests☆186Updated last year