Vulnerable-AD Logo

Vulnerable-AD

0
Free
Updated 11 March 2025
Visit Website

Create a vulnerable active directory that allows you to test most Active Directory attacks in a local lab. Main Features: - Randomize Attacks - Full Coverage of the mentioned attacks - Some attacks require a client workstation - Supported Attacks: Abusing ACLs/ACEs, Kerberoasting, AS-REP Roasting, Abuse DnsAdmins, Password in Object Description, User Objects With Default password (Changeme123!), Password Spraying, DCSync, Silver Ticket, Golden Ticket, Pass-the-Hash, Pass-the-Ticket, SMB Signing Disabled. Example: If you haven't installed Active Directory yet, you can try the provided script. If you already have Active Directory installed, just run the script.

FEATURES

SIMILAR TOOLS

A guide on using Apache mod_rewrite to strengthen phishing attacks and bypass mobile device restrictions

Automatic tool for DNS rebinding-based SSRF attacks

A proof-of-concept tool that demonstrates automated MFA bypass techniques for Microsoft Outlook through browser automation and request interception.

CobaltBus enables Cobalt Strike C2 traffic via Azure Servicebus for enhanced covert operations.

A tool for Local File Inclusion (LFI) exploitation and scanning

Generates shellcode that loads Windows payloads from memory and runs them with parameters.

High-performant, coroutines-driven, and fully customisable Low & Slow load generator for real-world pentesting with undetectability through Tor.

A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.

A powerful penetration testing platform for identifying vulnerabilities and weaknesses in computer systems.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved