Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.
☆258Sep 18, 2022Updated 3 years ago
Alternatives and similar repositories for ad-honeypot-autodeploy
Users that are interested in ad-honeypot-autodeploy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆638Aug 15, 2025Updated 9 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆298Aug 18, 2023Updated 2 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆327Nov 6, 2022Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆150Jun 16, 2023Updated 2 years ago
- Maximizing BloodHound. Max is a good boy.☆534Apr 25, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- LDAP library for auditing MS AD☆495Feb 11, 2026Updated 3 months ago
- ☆94May 14, 2022Updated 4 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Aug 25, 2020Updated 5 years ago
- Kerberoast attack -pure python-☆434Nov 30, 2023Updated 2 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆443Aug 18, 2023Updated 2 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆189Jun 22, 2022Updated 3 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Mar 6, 2025Updated last year
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Apr 23, 2026Updated 3 weeks ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- gather gather gather☆587Mar 15, 2025Updated last year
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,962Jul 6, 2024Updated last year
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Payload Generation Framework☆1,981Aug 21, 2024Updated last year
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆404Aug 15, 2025Updated 9 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Jul 29, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Pushes Sysmon Configs☆91Jun 11, 2021Updated 4 years ago
- NTLM relaying for Windows made easy☆582Apr 25, 2023Updated 3 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆146Sep 4, 2021Updated 4 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Aug 15, 2023Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆487Jul 9, 2024Updated last year
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,293Apr 12, 2024Updated 2 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆385Apr 16, 2022Updated 4 years ago
- ☆2,187Apr 3, 2026Updated last month
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,827Mar 17, 2021Updated 5 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- ☆539Nov 20, 2021Updated 4 years ago
- Executes position independent shellcode from an encrypted zip☆304Dec 22, 2020Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,639Jul 10, 2023Updated 2 years ago
- Blueteam operational triage registry hunting/forensic tool.☆148Sep 2, 2025Updated 8 months ago