Explore the GOAD Active Directory lab in 5 minutes with Adalanche
☆42Jan 10, 2025Updated last year
Alternatives and similar repositories for adalanche-sampledata
Users that are interested in adalanche-sampledata are comparing it to the libraries listed below
Sorting:
- Wazuh - Virtual Machines (OVA and AMI)☆16Updated this week
- A CherryTree template for People OSINT. I was inspired by James Hall's CTF template and I used the lessons taught to me by Joe Gray to cr…☆11Aug 16, 2020Updated 5 years ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated 2 months ago
- Knowing which rule should trigger according to the redcannary test☆11Nov 23, 2024Updated last year
- Templates for developing your own listeners and agents for AdaptixC2.☆45Feb 28, 2026Updated last week
- CVE-2021-40444 Sample☆12Sep 10, 2021Updated 4 years ago
- An Adaptive Misuse Detection System☆46Nov 4, 2024Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- Entitlements plugin for a robust audit log☆23Mar 2, 2026Updated last week
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- Place to store my various exposed IoT cam-scanning work and info☆24Sep 25, 2023Updated 2 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆24Dec 15, 2025Updated 2 months ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆235Jul 8, 2025Updated 8 months ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- PSWeave: a PowerShell module bringing OpenAI's GPT to your fingertips, and simplified prompt engineering☆28May 4, 2024Updated last year
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆28Jul 30, 2024Updated last year
- A collection of handy Google Apps Script code snippets☆30Jan 11, 2023Updated 3 years ago
- реп полезностей для PT MaxPatrol SIEM☆24Sep 18, 2023Updated 2 years ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated last year
- BLACK ESK SIEM is a SIEM platform built with Elasticsearch, Syslog-Ng and Kibana☆28Mar 4, 2023Updated 3 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Dec 13, 2020Updated 5 years ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆95Feb 3, 2026Updated last month
- Bayesian Optimization Excutable and Visualizable Application☆10Aug 14, 2023Updated 2 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Sora2 Watermark Remover - AI-powered video watermark removal tool using deep learning. Built with Next.js 15, ComfyUI API & advanced comp…☆24Oct 13, 2025Updated 4 months ago
- JScripter is a Python script designed to scrape and save unique JavaScript files from a list of URLs or a single URL.☆29Nov 26, 2024Updated last year
- ☆40Oct 11, 2025Updated 4 months ago
- ☆75Mar 19, 2025Updated 11 months ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆87Dec 20, 2024Updated last year
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆40Jun 12, 2016Updated 9 years ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆124Feb 17, 2026Updated 2 weeks ago
- ☆37Jan 4, 2026Updated 2 months ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,052Nov 9, 2024Updated last year
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago