Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04
☆117Jun 12, 2024Updated last year
Alternatives and similar repositories for deploy-goad
Users that are interested in deploy-goad are comparing it to the libraries listed below
Sorting:
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆17Jan 13, 2024Updated 2 years ago
- ☆185Dec 4, 2024Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆326Nov 6, 2022Updated 3 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,475Jan 23, 2026Updated last month
- Monitor your PingCastle scans to highlight the rule diff between two scans☆157Feb 19, 2026Updated 2 weeks ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 11 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year
- A tiny tool built to help AD Admins tame the Protected Users group.☆140Sep 8, 2025Updated 5 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆204Jun 23, 2023Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆483Jul 9, 2024Updated last year
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆837Oct 29, 2025Updated 4 months ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆66Oct 17, 2023Updated 2 years ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆314Feb 16, 2026Updated 2 weeks ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆257Jan 23, 2026Updated last month
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,051Nov 9, 2024Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 2 years ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆624Feb 16, 2026Updated 2 weeks ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆240Dec 4, 2022Updated 3 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 3 months ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- PowerShell module to manage domain controllers & initial domain deployments☆13Oct 31, 2025Updated 4 months ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆517Feb 1, 2024Updated 2 years ago
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆154Jul 11, 2024Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆862Feb 3, 2024Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆35Aug 21, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Feb 18, 2026Updated 2 weeks ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆779Oct 16, 2025Updated 4 months ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 2 years ago
- A (partial) Python rewriting of PowerSploit's PowerView☆1,100Updated this week
- Poc script for ProxyShell exploit chain in Exchange Server☆24Feb 24, 2022Updated 4 years ago
- Custom Queries - Brought Up to BH4.1 syntax☆276Dec 7, 2025Updated 2 months ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆202Aug 1, 2025Updated 7 months ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 11 months ago