dfirdeferred / Create-Vulnerable-ADDSLinks
Installs ADDS and configures a vulnerable domain via a powershell script
☆12Updated 2 years ago
Alternatives and similar repositories for Create-Vulnerable-ADDS
Users that are interested in Create-Vulnerable-ADDS are comparing it to the libraries listed below
Sorting:
- ☆32Updated 2 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆28Updated 5 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated 2 weeks ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆45Updated 2 weeks ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆42Updated 8 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆78Updated 11 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆76Updated 2 weeks ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆87Updated 2 months ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Updated last year
- IP address filter by City☆12Updated 8 months ago
- ☆21Updated last week
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆35Updated 2 years ago
- create a "simulated internet" cyber range environment☆18Updated 4 months ago
- ☆32Updated 9 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆21Updated 3 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last month
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆43Updated 2 months ago
- A not-curated list of cloud hacking labs☆27Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated 2 years ago
- ☆22Updated 2 years ago
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- AHHHZURE is an automated deployment script that creates a vulnerable Azure cloud lab for offensive security practitioners and enthusiasts…☆105Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- ☆12Updated 11 months ago
- ☆42Updated 3 years ago
- Repository for Ludus french templates☆19Updated 5 months ago
- ☆78Updated last year