{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"AD-Attacks-by-Service","owner":"AD-Attacks","isFork":false,"description":"Active Directory Penetration Testing for Red Teams","allTopics":["hacking","enumeration","activedirectory","penetration-testing","pentesting","passwords","redteam","kerberos-authentication","crto","passthehash","passwordscracking","poplabsec"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":50,"forksCount":9,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-20T23:22:38.386Z"}},{"type":"Public","name":"AD-Binaries","owner":"AD-Attacks","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-20T12:52:12.362Z"}},{"type":"Public","name":"Active-Directory-Penetration-Testing","owner":"AD-Attacks","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":14,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-23T21:26:28.287Z"}},{"type":"Public","name":"AD-CVEs","owner":"AD-Attacks","isFork":false,"description":"Active Directory CVEs List","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-24T23:41:52.705Z"}},{"type":"Public","name":"Vulnerable-AD-Labs","owner":"AD-Attacks","isFork":false,"description":"List of Vulnerable AD Labs","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-07T21:05:59.403Z"}},{"type":"Public","name":"LOLAD","owner":"AD-Attacks","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-01T14:42:34.796Z"}},{"type":"Public","name":".github","owner":"AD-Attacks","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-28T01:37:26.575Z"}},{"type":"Public","name":"MITRE-ATT-CK","owner":"AD-Attacks","isFork":false,"description":"Active Directory attacks mapped to MITRE ATT&CK Framework","allTopics":["active-directory","enumeration","privilege-escalation","mitre-attack","red-teaming","lateral-movement"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-20T19:25:05.628Z"}},{"type":"Public","name":"RFS-BadBlood","owner":"AD-Attacks","isFork":true,"description":"BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active D","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":273,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-18T19:55:33.959Z"}},{"type":"Public template","name":"Vulnerable_Active_Directory_Lab","owner":"AD-Attacks","isFork":false,"description":"","allTopics":["powershell","terraform","lab","hacking","pentesting"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-13T15:37:15.514Z"}},{"type":"Public","name":"Azure-Penetration-Testing","owner":"AD-Attacks","isFork":false,"description":"Azure Penetration Testing","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-02-02T13:51:13.116Z"}}],"repositoryCount":11,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"AD-Attacks repositories"}