dievus / BadListerLinks
Deny list generator for password filters
☆25Updated last year
Alternatives and similar repositories for BadLister
Users that are interested in BadLister are comparing it to the libraries listed below
Sorting:
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- List of tools and resources for pentesting Microsoft Active Directory☆85Updated last month
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆190Updated 6 months ago
- Labs & Code snippets for RRT on TTI☆40Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 6 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆190Updated 10 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- ☆23Updated 7 months ago
- ☆74Updated this week
- ☆16Updated 3 weeks ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆94Updated 2 weeks ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 4 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆208Updated 5 months ago
- List of Command&Control (C2) software☆42Updated 2 years ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆85Updated 4 months ago
- Dredging up secrets from the depths of the file system☆131Updated 9 months ago
- ☆65Updated 2 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆57Updated 10 months ago
- ☆40Updated 8 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆144Updated last month
- Script related in Active Directory Attacks Domain☆22Updated 2 years ago
- ☆170Updated 4 months ago
- Creation of a laboratory for malware analysis in AWS☆102Updated 2 years ago
- Knowledge Management for Offensive Security Professionals Official Repository☆148Updated 6 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year