dievus / BadLister
Deny list generator for password filters
☆25Updated 7 months ago
Alternatives and similar repositories for BadLister:
Users that are interested in BadLister are comparing it to the libraries listed below
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- List of tools and resources for pentesting Microsoft Active Directory☆42Updated 2 weeks ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- Labs & Code snippets for RRT on TTI☆39Updated 2 years ago
- ☆16Updated 5 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆183Updated last month
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- ☆74Updated this week
- Yoink is a quick tool for use with Obsidian that will allow you to take a markdown file and package it up into a folder that will allow y…☆14Updated last year
- ☆14Updated last month
- Internal Network Penetration Test Playbook☆16Updated 2 years ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆134Updated last month
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆71Updated 2 months ago
- ☆141Updated 4 months ago
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆34Updated 2 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆51Updated 5 months ago
- Notes and resources for the AD☆11Updated 2 years ago
- MayorSec DNS Enumeration Tool☆85Updated 3 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated 11 months ago
- A collection of tools that I use in CTF's or for assessments☆95Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆119Updated 2 years ago
- Creation of a laboratory for malware analysis in AWS☆95Updated 2 years ago
- A collection of CVEs weaponized by ransomware operators☆111Updated last week
- ☆24Updated 2 years ago
- Living Off Security Tools☆45Updated 4 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated 7 months ago