Installs ADDS and configures a vulnerable domain via a powershell script
☆13Jul 13, 2023Updated 2 years ago
Alternatives and similar repositories for Create-Vulnerable-ADDS
Users that are interested in Create-Vulnerable-ADDS are comparing it to the libraries listed below
Sorting:
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated 2 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Jun 12, 2024Updated last year
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆39Jul 23, 2025Updated 7 months ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- A PowerShell wrapper for certutil.exe☆20Updated this week
- Repository for Ludus french templates☆23Mar 1, 2026Updated 2 weeks ago
- A Kubernetes challenge type plugin for CTFd☆16Nov 21, 2025Updated 4 months ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- ADDS (Active Directory Domain Services)☆28Feb 3, 2026Updated last month
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- Acunetix automate telegram bot☆11Jul 19, 2024Updated last year
- Implementing ISO/IEC 27001:2022, by EC-Council☆16Feb 20, 2026Updated last month
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆39Jan 1, 2022Updated 4 years ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- ☆13May 21, 2021Updated 4 years ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆49Jul 28, 2025Updated 7 months ago
- ☆38Mar 28, 2025Updated 11 months ago
- Automatically exported from code.google.com/p/fuzzdb☆13Mar 23, 2015Updated 10 years ago
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago
- ☆13Jul 4, 2024Updated last year
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated 2 weeks ago
- A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆27May 28, 2025Updated 9 months ago
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- This repository contains a few of my writeups I made for the famous and addictive TryHackMe CTF (Capture The Flag) challenges.☆11Sep 19, 2021Updated 4 years ago
- ddos_tool_2025 – Powerful open‑source framework for stress testing & DDoS resilience. Supports multi‑layer attacks (L3/L4/L7), Cloudflare…☆22Jul 30, 2025Updated 7 months ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- A python library to create BloodHound OpenGraphs☆56Feb 4, 2026Updated last month
- A Centralized Wiki for CTF Organization☆10Sep 22, 2021Updated 4 years ago
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago