lkarlslund / deploy-goadLinks
Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04
☆116Updated last year
Alternatives and similar repositories for deploy-goad
Users that are interested in deploy-goad are comparing it to the libraries listed below
Sorting:
- ☆184Updated last year
- Automatically run and populate a new instance of BH CE☆113Updated this week
- A Azure Exploitation Toolkit for Red Team & Pentesters☆166Updated 2 years ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆156Updated last month
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆175Updated 6 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258Updated 3 years ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆127Updated 3 years ago
- Azure AD cheatsheet for the CARTP course☆143Updated 3 years ago
- Collection of scripts to retrieve stored passwords from Veeam Backup☆144Updated 7 months ago
- ☆105Updated 2 years ago
- ☆186Updated last month
- ☆154Updated 10 months ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆82Updated last year
- User Enumeration of Microsoft Teams users via API☆184Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆76Updated last year
- ☆102Updated 2 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆92Updated 6 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆107Updated 2 years ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆142Updated 5 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆206Updated last year
- InfoSec Notes☆61Updated last year
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆204Updated last year
- Cortex XDR Config Extractor☆135Updated 2 years ago
- ☆164Updated 7 months ago
- Parses Snaffler output file and generate beautified outputs.☆132Updated 3 weeks ago