ralphte / build_a_phishLinks
Ansible playbook to deploy a phishing engagement in the cloud.
☆221Updated 3 years ago
Alternatives and similar repositories for build_a_phish
Users that are interested in build_a_phish are comparing it to the libraries listed below
Sorting:
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 4 years ago
- Infrastructure Automation☆356Updated last year
- An active directory laboratory for penetration testing.☆141Updated 4 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆361Updated 4 months ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆443Updated 3 years ago
- ☆199Updated 6 years ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆368Updated 5 years ago
- Active Directory Lab for Penetration Testing☆52Updated 3 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆476Updated last year
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆179Updated 6 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆323Updated 2 years ago
- User enumeration with Microsoft Teams API☆174Updated 4 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆284Updated last year
- ☆191Updated 2 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆68Updated last year
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆157Updated 2 years ago
- Modular Enumeration and Password Spraying Framework☆129Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆207Updated 2 weeks ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆257Updated 3 years ago
- ☆116Updated 4 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆215Updated 2 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆43Updated 7 months ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆145Updated 3 years ago
- ☆166Updated 2 years ago
- Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527☆18Updated 4 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Updated 4 years ago
- Browser extension that extracts users from LinkedIn company pages☆161Updated 2 years ago
- ☆118Updated 4 years ago
- Your template-based BloodHound terminal companion tool☆433Updated 2 months ago
- BloodHound Docker Ready to Use☆91Updated 2 years ago