heartburn-dev / vulnerable-ad-terraform
Learning a little bit of DevOps and using Infrastructure-as-a-Code tools to automate the creation of the AD lab in TCM Security's course.
☆9Updated 2 years ago
Alternatives and similar repositories for vulnerable-ad-terraform:
Users that are interested in vulnerable-ad-terraform are comparing it to the libraries listed below
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- This contains the contents needed to deploy a home lab in VirtualBox.☆18Updated 4 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- ☆17Updated last year
- Ansible role that Installs Mythic☆14Updated 8 months ago
- ☆20Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 3 years ago
- ☆16Updated 2 years ago
- A user enumeration tool for Slack.☆24Updated 8 months ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- self-hosted Azure OSINT tool☆26Updated 5 months ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆27Updated last year
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Enumerate and check domains for Azure tenants☆46Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- A simple bastion host setup designed for cloud-hosted lab environments.☆27Updated 4 years ago
- Automatically deploy Nemesis☆20Updated 8 months ago
- ☆15Updated 2 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆15Updated last year
- Bloodhound Portable for Windows☆51Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆14Updated 4 years ago