dfirdeferred / Create-Vulnerable-ADDSLinks
Installs ADDS and configures a vulnerable domain via a powershell script
☆12Updated 2 years ago
Alternatives and similar repositories for Create-Vulnerable-ADDS
Users that are interested in Create-Vulnerable-ADDS are comparing it to the libraries listed below
Sorting:
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated 2 months ago
- A not-curated list of cloud hacking labs☆26Updated last year
- ☆24Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated 11 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆34Updated last year
- IP address filter by City☆12Updated 11 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆91Updated 5 months ago
- create a "simulated internet" cyber range environment☆19Updated 7 months ago
- This python script performs a number of sqlite queries (mainly password metadata) against sqlite databases (Created by ROADtools) to prov…☆22Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆66Updated 9 months ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆79Updated 3 months ago
- Collection of Tools & Techniques for analyzing URLs☆33Updated 2 years ago
- Claude MCP server to perform analysis on ROADrecon data☆48Updated 9 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago
- Repository for Ludus french templates☆21Updated last month
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated 2 years ago
- A short scraper looking for a POC of CVE-2024-49112☆14Updated last year
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆23Updated 6 months ago
- ☆31Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆46Updated 3 months ago
- Living Off Security Tools☆58Updated last month
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆48Updated 6 months ago
- ☆42Updated 3 years ago
- Resources for AD penetration testing and security☆33Updated 3 years ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- ☆76Updated last year
- https://lolad-project.github.io/☆83Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago