vulfilip / grouppvm
Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for grouppvm
- Automate the build of a vulnerable AD environment.☆33Updated 2 years ago
- List of Command&Control (C2) software☆34Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆74Updated 3 years ago
- ☆32Updated 3 years ago
- My Favorite Offensive Security Scripts☆62Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆89Updated last year
- Various AD tools needed for penetration testing in one place.☆21Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆103Updated 2 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆106Updated 5 months ago
- Automated Active Directory lab running on Proxmox☆68Updated 3 weeks ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆88Updated 3 months ago
- Living off the land searches for explorer and sharepoint☆49Updated 2 weeks ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆36Updated 2 weeks ago
- Script related in Active Directory Attacks Domain☆21Updated last year
- a simple powershell wrapper to automate checking a user's access around the network☆12Updated 11 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 11 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆28Updated 5 months ago
- Automatically deploy Nemesis☆19Updated 5 months ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆86Updated last year
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆17Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆26Updated 8 months ago
- A collection of red blue team staff☆45Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆38Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆85Updated last year
- ☆41Updated 2 years ago
- InfoSec Notes☆53Updated 7 months ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆31Updated 3 months ago
- create a "simulated internet" cyber range environment☆13Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆75Updated last week
- Scripts and piece of codes used for Active Directory configuration☆80Updated last year