tothi / ad-honeypot-autodeploy
Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.
☆251Updated 2 years ago
Alternatives and similar repositories for ad-honeypot-autodeploy:
Users that are interested in ad-honeypot-autodeploy are comparing it to the libraries listed below
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆225Updated 4 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆445Updated 2 years ago
- A curated list of awesome BloodhoundAD resources☆232Updated 2 years ago
- A PowerShell module to deploy active directory decoy objects.☆226Updated 5 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆65Updated 3 years ago
- A modular OSINT honeypot for blue teamers☆331Updated last year
- Sysmon EDR POC Build within Powershell to prove ability.☆220Updated 3 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆151Updated 3 years ago
- Password Hunter in Active Directory☆197Updated 2 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆397Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆176Updated 2 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆215Updated 4 years ago
- ☆332Updated 2 years ago
- Misc Threat Hunting Resources☆373Updated 2 years ago
- ☆257Updated last year
- Purple Teaming Attack & Hunt Lab - Terraform☆158Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆457Updated 7 months ago
- Tool Analysis Result Sheet☆347Updated 7 years ago
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- Kerberoast attack -pure python-☆426Updated last year
- Disposable and resilient red team infrastructure with Terraform☆260Updated 6 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆432Updated 2 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆149Updated 3 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆283Updated 6 years ago
- Fast offline auditing of Active Directory passwords using Python.☆163Updated 6 months ago
- Credential and Red Teaming Defense for Windows Environments☆325Updated 7 months ago