☆165Feb 13, 2020Updated 6 years ago
Alternatives and similar repositories for WindowsAttackAndDefenseLab
Users that are interested in WindowsAttackAndDefenseLab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆493Feb 16, 2019Updated 7 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆281Apr 29, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆170Aug 10, 2020Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆234Oct 18, 2022Updated 3 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆400Feb 27, 2024Updated 2 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆232May 30, 2019Updated 6 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆326Apr 26, 2020Updated 6 years ago
- Splunk Dashboard for CobaltStrike logs☆90Mar 16, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Rapid Attack Infrastructure (RAI)☆309Nov 24, 2024Updated last year
- ☆110May 14, 2018Updated 8 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- ☆527Sep 15, 2022Updated 3 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆128Feb 27, 2025Updated last year
- Miscellaneous Tools☆269Oct 29, 2020Updated 5 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Jul 10, 2018Updated 7 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- Domain Password Audit Tool for Pentesters☆1,041Dec 24, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Process Injection☆767Oct 24, 2021Updated 4 years ago
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆398Apr 22, 2018Updated 8 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago
- Resources for our Active Directory security workshops☆140Sep 9, 2021Updated 4 years ago
- Detect and abuse risky SPNs☆267Jun 15, 2017Updated 8 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆636Jun 20, 2017Updated 8 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆332Oct 20, 2019Updated 6 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆274Jan 27, 2021Updated 5 years ago
- ☆210Jan 30, 2019Updated 7 years ago
- ☆78May 24, 2018Updated 7 years ago
- Tricks for penetration testing☆587Apr 22, 2026Updated 3 weeks ago