lorentzenman / sheeplLinks
Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments
☆396Updated last year
Alternatives and similar repositories for sheepl
Users that are interested in sheepl are comparing it to the libraries listed below
Sorting:
- Simulates common user behaviour on local and remote Windows hosts.☆282Updated 7 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- ☆283Updated 7 years ago
- Credential and Red Teaming Defense for Windows Environments☆329Updated 11 months ago
- A PowerShell module to deploy active directory decoy objects.☆232Updated 5 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆490Updated 6 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆451Updated 7 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆318Updated 5 years ago
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆244Updated 7 months ago
- ☆391Updated 3 weeks ago
- Automated, Collection, and Enrichment Platform☆325Updated 5 years ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆194Updated last year
- Assorted scripts and one off things☆270Updated 10 months ago
- Some PowerShell Stuff☆281Updated 3 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Updated 3 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆673Updated last year
- Malicious WMI Events using PowerShell☆387Updated 8 years ago
- ☆350Updated 4 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆367Updated 11 months ago
- A framework for stealthy domain reconnaissance☆303Updated 3 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆228Updated 7 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Updated 8 years ago
- A curated list of awesome BloodhoundAD resources☆232Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆392Updated 7 years ago
- Active Directory forensic framework☆326Updated 3 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆380Updated 5 years ago
- ☆169Updated 5 years ago
- Chameleon: A tool for evading Proxy categorisation☆497Updated 7 months ago