Event JSON
{
"id": "8f79d88556077ff25cd053a5b2ba8313b474d32ee156058f57c937d94265a367",
"pubkey": "05df33b31d45568d221f414c169c9abebd0765b8ab0e13d6e84461eb3a961a38",
"created_at": 1745867085,
"kind": 1,
"tags": [
[
"t",
"activedirectory"
],
[
"t",
"cybersecurity"
],
[
"t",
"github"
],
[
"t",
"infosec"
],
[
"t",
"software"
],
[
"t",
"technology"
],
[
"t",
"news"
],
[
"t",
"ctf"
],
[
"t",
"cybersecuritycareer"
],
[
"t",
"hacking"
],
[
"t",
"redteam"
],
[
"t",
"blueteam"
],
[
"t",
"purpleteam"
],
[
"t",
"tips"
],
[
"t",
"opensource"
],
[
"t",
"cloudsecurity"
],
[
"imeta",
"url https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/417/145/290/885/050/original/e0d9fee076cd4074.png",
"m image/png",
"dim 1200x600",
"blurhash UQR{x%%MD*tRe=x]RPt6WAWAa~Rk_NM{x[WA"
],
[
"proxy",
"https://infosec.exchange/users/alevsk/statuses/114417145294975292",
"activitypub"
],
[
"client",
"Mostr",
"31990:6be38f8c63df7dbf84db7ec4a6e6fbbd8d19dca3b980efad18585c46f04b26f9:mostr",
"wss://relay.mostr.pub"
]
],
"content": "New Open-Source Tool Spotlight 🚨🚨🚨\n\nGOAD (Game of Active Directory) by Orange-Cyberdefense is a lab for pentesting Active Directory environments. With multiple configurations like GOAD-Mini and SCCM labs, it helps security professionals practice AD attack techniques. Caution: Designed for isolated lab use only. #ActiveDirectory #Cybersecurity\n\n🔗 Project link on #GitHub 👉 https://github.com/Orange-Cyberdefense/GOAD\n\n#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity\n\n— ✨\n🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴☠️\n\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/114/417/145/290/885/050/original/e0d9fee076cd4074.png",
"sig": "6645fd9f4c991ca082714f30173953401bb70e24d15e3d93ae49c99bf47dbfbb924b2d2fd2cb07fedd530e3056388b22444b7f90f6a654e5cbf230c76dea31d1"
}