tothi / ad-honeypot-autodeployLinks
Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.
☆258Updated 2 years ago
Alternatives and similar repositories for ad-honeypot-autodeploy
Users that are interested in ad-honeypot-autodeploy are comparing it to the libraries listed below
Sorting:
- Active Directory Lab for Penetration Testing☆53Updated 4 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- A PowerShell module to deploy active directory decoy objects.☆232Updated 5 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Updated 2 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆150Updated 3 years ago
- ☆170Updated this week
- ☆334Updated 2 years ago
- ATTPwn☆214Updated last year
- Fast offline auditing of Active Directory passwords using Python.☆164Updated 11 months ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆147Updated 4 years ago
- Kerberoast attack -pure python-☆438Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 5 months ago
- A curated list of awesome BloodhoundAD resources☆233Updated 2 years ago
- A modular OSINT honeypot for blue teamers☆336Updated 2 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆154Updated 3 years ago
- Audit Windows Security with best Practice☆185Updated 9 months ago
- Parse .nessus file(s) and shows output in interactive UI☆154Updated 2 months ago
- Deploy customizable Active Directory labs in Azure - automatically.☆422Updated 7 months ago
- Picus Labs☆44Updated 4 years ago
- Collection of created MindMaps☆150Updated last year
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆336Updated 6 years ago
- Password Hunter in Active Directory☆198Updated 2 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆354Updated last year
- Build a attack range in your local machine☆131Updated 2 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆204Updated 4 years ago
- Miscellaneous tools for BloodHound☆393Updated last year
- Disposable and resilient red team infrastructure with Terraform☆270Updated 6 years ago
- Basic C2 Server☆191Updated 4 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆225Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago