Active Directory Control Paths auditing and graphing tools
☆680Dec 17, 2020Updated 5 years ago
Alternatives and similar repositories for AD-control-paths
Users that are interested in AD-control-paths are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active Directory permissions (ACL/ACE) auditing tools☆148Jun 15, 2017Updated 8 years ago
- Active Directory Group Policy analyzer☆108Apr 10, 2014Updated 11 years ago
- Timeline of Active Directory changes with replication metadata☆522Mar 21, 2025Updated last year
- Exchange privilege escalations to Active Directory☆810Apr 23, 2023Updated 2 years ago
- AD-control-paths LDAP submodule☆19Jun 20, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆277Jan 6, 2026Updated 2 months ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- A curated list of awesome Security Hardening techniques for Windows.☆1,787Jan 7, 2020Updated 6 years ago
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆1,894Jun 15, 2020Updated 5 years ago
- Repo for ADACLScan.ps1 - Your number one script for ACL's in Active Directory☆1,151Jan 22, 2026Updated 2 months ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆658Aug 19, 2019Updated 6 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆492Feb 16, 2019Updated 7 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- Six Degrees of Domain Admin☆10,558Mar 2, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆737Feb 5, 2019Updated 7 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Sep 14, 2020Updated 5 years ago
- A script for advanced discovery of Privileged Accounts - includes Shadow Admins☆828Sep 9, 2019Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,930Nov 19, 2025Updated 4 months ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Powershell C2 Server and Implants☆576Nov 11, 2019Updated 6 years ago
- Run PowerShell command without invoking powershell.exe☆1,536Mar 23, 2023Updated 3 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,821Mar 17, 2021Updated 5 years ago
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,806Mar 11, 2026Updated 2 weeks ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,316Nov 22, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,218Aug 7, 2025Updated 7 months ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,141Oct 19, 2025Updated 5 months ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Active Directory ACL exploitation with BloodHound☆756Nov 18, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Bloodhound Reporting for Blue and Purple Teams☆1,280Nov 15, 2025Updated 4 months ago
- Generic graph exploration, manipulation and visualization tool (Outil de Visualisation et Analyse de Liens Inter-objets)☆36Aug 17, 2020Updated 5 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆854Mar 23, 2018Updated 8 years ago
- A repository for using windows event forwarding for incident detection and response☆1,302Sep 8, 2025Updated 6 months ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Directory Services Internals (DSInternals) PowerShell Module and Framework☆1,914Updated this week
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year