tothi / ad-honeypot-autodeployLinks
Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.
☆258Updated 3 years ago
Alternatives and similar repositories for ad-honeypot-autodeploy
Users that are interested in ad-honeypot-autodeploy are comparing it to the libraries listed below
Sorting:
- Active Directory Lab for Penetration Testing☆53Updated 5 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆231Updated 5 years ago
- ATTPwn☆217Updated last year
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- ☆333Updated 3 years ago
- A PowerShell module to deploy active directory decoy objects.☆238Updated 6 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 4 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆445Updated 3 years ago
- A curated list of awesome BloodhoundAD resources☆237Updated 3 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆149Updated 5 years ago
- ☆192Updated last month
- Audit Windows Security with best Practice☆191Updated last year
- Parse .nessus file(s) and shows output in interactive UI☆161Updated 2 weeks ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 10 months ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆178Updated 3 years ago
- Picus Labs☆44Updated 4 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆226Updated 4 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆226Updated 4 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆156Updated 4 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- Fake User Generator for Active Directory Environments☆159Updated 7 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆161Updated 4 years ago
- nse script to inject jndi payloads☆45Updated 4 years ago
- Collection of created MindMaps☆151Updated 2 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Updated 4 years ago
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆342Updated 7 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Updated 4 years ago
- A Docker container for remote penetration testing.☆141Updated 4 years ago
- zBang is a risk assessment tool that detects potential privileged account threats☆345Updated 3 years ago