Active Directory Control Paths auditing and graphing tools
☆679Dec 17, 2020Updated 5 years ago
Alternatives and similar repositories for AD-control-paths
Users that are interested in AD-control-paths are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active Directory permissions (ACL/ACE) auditing tools☆148Jun 15, 2017Updated 8 years ago
- Active Directory Group Policy analyzer☆108Apr 10, 2014Updated 12 years ago
- Timeline of Active Directory changes with replication metadata☆524Mar 21, 2025Updated last year
- Exchange privilege escalations to Active Directory☆811Apr 23, 2023Updated 3 years ago
- AD-control-paths LDAP submodule☆19Jun 20, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆280Jan 6, 2026Updated 4 months ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,795Jan 7, 2020Updated 6 years ago
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆1,911Jun 15, 2020Updated 5 years ago
- Repo for ADACLScan.ps1 - Your number one script for ACL's in Active Directory☆1,163Jan 22, 2026Updated 3 months ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆659Aug 19, 2019Updated 6 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆492Feb 16, 2019Updated 7 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- Six Degrees of Domain Admin☆10,532Mar 2, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆736Feb 5, 2019Updated 7 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- A script for advanced discovery of Privileged Accounts - includes Shadow Admins☆829Sep 9, 2019Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,956Nov 19, 2025Updated 5 months ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆1,551Apr 9, 2026Updated 3 weeks ago
- PowerShell Runspace Post Exploitation Toolkit☆1,550Aug 2, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆170Jun 8, 2017Updated 8 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,821Mar 17, 2021Updated 5 years ago
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,838Apr 14, 2026Updated 3 weeks ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,321Nov 22, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,227Aug 7, 2025Updated 9 months ago
- Auto Domain Admin and Network Exploitation.☆298Dec 21, 2017Updated 8 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,171Apr 22, 2026Updated 2 weeks ago
- Active Directory ACL exploitation with BloodHound☆761Nov 18, 2021Updated 4 years ago
- Bloodhound Reporting for Blue and Purple Teams☆1,289Nov 15, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Generic graph exploration, manipulation and visualization tool (Outil de Visualisation et Analyse de Liens Inter-objets)☆36Aug 17, 2020Updated 5 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆851Mar 23, 2018Updated 8 years ago
- A repository for using windows event forwarding for incident detection and response☆1,319Sep 8, 2025Updated 7 months ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆454Apr 22, 2016Updated 10 years ago
- Directory Services Internals (DSInternals) PowerShell Module and Framework☆1,937Mar 28, 2026Updated last month
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago