All Projects → chryzsh → Darthsidious

chryzsh / Darthsidious

Building an Active Directory domain and hacking it

Programming Languages

powershell
5483 projects

Projects that are alternatives of or similar to Darthsidious

Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+81.63%)
Mutual labels:  hacking, active-directory
Adaz
🔧 Automatically deploy customizable Active Directory labs in Azure
Stars: ✭ 197 (-58.87%)
Mutual labels:  lab, active-directory
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+190.61%)
Mutual labels:  hacking, active-directory
Ssrf vulnerable lab
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (-24.63%)
Mutual labels:  lab, hacking
Awesome Windows Security
List of Awesome Windows Security Resources
Stars: ✭ 196 (-59.08%)
Mutual labels:  hacking, active-directory
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-20.25%)
Mutual labels:  hacking, active-directory
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-10.86%)
Mutual labels:  hacking
Solr Injection
Apache Solr Injection Research
Stars: ✭ 464 (-3.13%)
Mutual labels:  hacking
Hulk
HULK DoS tool ported to Go with some additional features.
Stars: ✭ 427 (-10.86%)
Mutual labels:  hacking
Brutesploit
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 424 (-11.48%)
Mutual labels:  hacking
Instainsane
Multi-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (-0.84%)
Mutual labels:  hacking
Dronesploit
Drone pentesting framework console
Stars: ✭ 473 (-1.25%)
Mutual labels:  hacking
Plumhound
Bloodhound for Blue and Purple Teams
Stars: ✭ 452 (-5.64%)
Mutual labels:  active-directory
Goohak
Automatically Launch Google Hacking Queries Against A Target Domain
Stars: ✭ 432 (-9.81%)
Mutual labels:  hacking
Pentestkit
Useful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (-3.34%)
Mutual labels:  hacking
Appinfoscanner
一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Stars: ✭ 424 (-11.48%)
Mutual labels:  hacking
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-1.04%)
Mutual labels:  hacking
Wahh extras
The Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (-10.65%)
Mutual labels:  hacking
Hacking Tools Repository
A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.
Stars: ✭ 448 (-6.47%)
Mutual labels:  hacking
Search That Hash
🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡
Stars: ✭ 466 (-2.71%)
Mutual labels:  hacking

Darth Sidious

The goal is simple
To share my modest knowledge about hacking Windows systems. This is commonly refered to as red team exercises. This book however, is also very concerned with the blue team; the defenders. That is, helping those who are working as defenders, analysts and security experts to build secure Active Directory environments and monitor them for malicious activity.

There are three major parts in this book

  1. Building a lab
  2. Hacking it
  3. Defending it

I have structured this book so it can be followed more or less sequentally. To practice many of these things, a lab is necessary. That is why I have made a few guides on how to build a lab, with varying degrees of comprehensiveness and size.

Getting started

GETTING STARTED

Getting the Source Code

The source for this book is available in the book's github repository.

Changelog

Date Who What
May 2017 chryzsh Book created
March 2018 chryzsh Restructured book
30.03.2018 bufferov3rride Added article Pivoting Through Exchange
02.04.2018 chryzsh Restructured book again and removed some unfinished articles
11.04.2018 chryzsh Added the article Building a malware analysis lab
14.04.2018 chryzsh Added the article Password cracking and auditing
23.04.2018 filippos Added the article CrackMapExec
06.05.2018 chryzsh Fixed a link messup and some restructuring

Questions/Suggestions: Ping me on Twitter @chryzsh

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].