dfirdeferred / Create-Vulnerable-ADDSLinks
Installs ADDS and configures a vulnerable domain via a powershell script
☆12Updated 2 years ago
Alternatives and similar repositories for Create-Vulnerable-ADDS
Users that are interested in Create-Vulnerable-ADDS are comparing it to the libraries listed below
Sorting:
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Updated 2 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆48Updated 6 months ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆34Updated last year
- IP address filter by City☆12Updated last year
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated 2 years ago
- Repository for Ludus french templates☆21Updated 2 weeks ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆46Updated 4 months ago
- ☆31Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆44Updated last year
- Claude MCP server to perform analysis on ROADrecon data☆48Updated 10 months ago
- ☆33Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆66Updated 10 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- Impacket with added MSSQL Relay server☆49Updated last month
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆65Updated 2 weeks ago
- Collection of Tools & Techniques for analyzing URLs☆33Updated 2 years ago
- ☆42Updated 3 years ago
- Scripts that automate portions of pentests.☆57Updated this week
- A not-curated list of cloud hacking labs☆26Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆92Updated 6 months ago
- Cloud subdomains identification tool☆62Updated 9 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆79Updated last week
- https://lolad-project.github.io/☆84Updated last year
- ☆41Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Updated 5 months ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Updated 8 months ago