GithubHelp home page GithubHelp logo

On the Windows VM, open a powershell prompt as Administrator and run:

PS > Set-ExecutionPolicy -ExecutionPolicy Unrestricted -Force
PS > . { Invoke-WebRequest -useb https://boxstarter.org/bootstrapper.ps1 } | iex; Get-Boxstarter -Force

Once the installation has completed, a Boxstarter Shell icon will appear on your desktop. Launch the Boxstarter Shell and enter the following command:

PS > Install-BoxstarterPackage -PackageName https://raw.githubusercontent.com/mostwantedduck/setup-machines/main/windows10.choco

On the Kali VM, open a terminal and run:

kali@kali:~$ curl -s https://raw.githubusercontent.com/mostwantedduck/setup-machines/main/kali.sh | bash 

Most Wanted Duck's Projects

ad-attack-defense icon ad-attack-defense

Attack and defend active directory using modern post exploitation adversary tradecraft activity

adgenerator icon adgenerator

Active Directory Generator for upcoming domain pivoting course.

adlab icon adlab

Active Directory Lab for Penetration Testing

an-intro-2-win-ed icon an-intro-2-win-ed

"An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast Missouri State University Cyber Range- based off of my exploit development highs and lows over the past few years.

armada icon armada

A high performance TCP SYN port scanner.

at-ps icon at-ps

Adversary Tactics - PowerShell Training

autoad icon autoad

Simple python script for AD enumeration

awae-prep icon awae-prep

This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with the AWAE course. This repo will likely contain custom code by me and various courses.

awesome-bugbounty-writeups icon awesome-bugbounty-writeups

A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference

awesome-pentest icon awesome-pentest

A collection of awesome penetration testing resources, tools and other shiny things

aws-enumerator icon aws-enumerator

The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testing. The tool is intended to speed up the process of Cloud review in case the security researcher compromised AWS Account Credentials.

cheatsheetseries icon cheatsheetseries

The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.

ckad icon ckad

Kubernetes for Developers training notes to take the Certified Kubernetes Application Developer (CKAD)

cobalt-wipe icon cobalt-wipe

Cobalt wipe is the non-commercial version of Cobalt-Strike 4.3 (May 2021 Release)

covenant icon covenant

Covenant is a collaborative .NET C2 framework for red teamers.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.