Installs ADDS and configures a vulnerable domain via a powershell script
☆12Jul 13, 2023Updated 2 years ago
Alternatives and similar repositories for Create-Vulnerable-ADDS
Users that are interested in Create-Vulnerable-ADDS are comparing it to the libraries listed below
Sorting:
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- A PowerShell wrapper for certutil.exe☆20Feb 21, 2026Updated last week
- Repository for Ludus french templates☆21Updated this week
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆39Jan 1, 2022Updated 4 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆117Jun 12, 2024Updated last year
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆37Jul 23, 2025Updated 7 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated 3 weeks ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆43Aug 10, 2025Updated 6 months ago
- Panoptes Endpoint Detection and Response Solution☆42Jan 19, 2026Updated last month
- A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆27May 28, 2025Updated 9 months ago
- ADDS (Active Directory Domain Services)☆28Feb 3, 2026Updated 3 weeks ago
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated 3 weeks ago
- Your Skyfall Infrastructure Pack☆89Jan 25, 2026Updated last month
- ☆38Mar 28, 2025Updated 11 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- ☆10Aug 4, 2020Updated 5 years ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- ☆145Oct 31, 2023Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- Secure NotebookLM MCP Server - Query Google NotebookLM from Claude/AI agents with 14 security hardening layers☆33Updated this week
- ☆14Dec 11, 2025Updated 2 months ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 2 years ago
- ☆44Jan 22, 2026Updated last month
- ☆160Jan 27, 2025Updated last year
- Validates priv escalation of AD trusts☆48Apr 1, 2025Updated 11 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Dec 8, 2023Updated 2 years ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago