tothi / ad-honeypot-autodeployLinks
Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.
☆257Updated 2 years ago
Alternatives and similar repositories for ad-honeypot-autodeploy
Users that are interested in ad-honeypot-autodeploy are comparing it to the libraries listed below
Sorting:
- Active Directory Lab for Penetration Testing☆51Updated 4 years ago
- A PowerShell module to deploy active directory decoy objects.☆229Updated 5 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆217Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Updated 2 years ago
- Deploy customizable Active Directory labs in Azure - automatically.☆420Updated 6 months ago
- A curated list of awesome BloodhoundAD resources☆230Updated 2 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆154Updated 3 years ago
- Audit Windows Security with best Practice☆184Updated 8 months ago
- Password Hunter in Active Directory☆198Updated 2 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 3 months ago
- Sysmon EDR POC Build within Powershell to prove ability.☆224Updated 4 years ago
- Fast offline auditing of Active Directory passwords using Python.☆163Updated 9 months ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆204Updated 4 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆334Updated 6 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 3 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆217Updated 4 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆483Updated 11 months ago
- Misc Threat Hunting Resources☆373Updated 2 years ago
- LDAP library for auditing MS AD☆421Updated last week
- ☆334Updated 2 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Kerberoast attack -pure python-☆434Updated last year
- PoSh BloodHound Dog Whisperer☆191Updated 2 years ago
- Collection of created MindMaps☆150Updated last year
- ☆163Updated last year
- Credential and Red Teaming Defense for Windows Environments☆330Updated 10 months ago