Active Directory Group Policy analyzer
☆108Apr 10, 2014Updated 11 years ago
Alternatives and similar repositories for SysvolExplorer
Users that are interested in SysvolExplorer are comparing it to the libraries listed below
Sorting:
- Active Directory permissions (ACL/ACE) auditing tools☆148Jun 15, 2017Updated 8 years ago
- AD-control-paths LDAP submodule☆19Jun 20, 2018Updated 7 years ago
- Active Directory Control Paths auditing and graphing tools☆679Dec 17, 2020Updated 5 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- 🗑 Simple program to uninstall some of the Windows 10 apps, that you cannot remove easily.☆10Jan 11, 2020Updated 6 years ago
- Timeline of Active Directory changes with replication metadata☆521Mar 21, 2025Updated 11 months ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆16Jul 27, 2024Updated last year
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Aug 10, 2014Updated 11 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Aug 26, 2015Updated 10 years ago
- Root module for creating Tier Model / Delegation Model on Active Directory☆20Aug 28, 2025Updated 6 months ago
- Windows PowerShell module to help in the auditing of Active Directory environments.☆50Mar 22, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Oct 6, 2017Updated 8 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- PowerShell based Microsoft DNS management tool set☆19May 26, 2016Updated 9 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆139Aug 3, 2017Updated 8 years ago
- Writing a 32-bit Protected Mode OS in NASM☆13Jun 22, 2012Updated 13 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 4 months ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- Collection of my test rules and Submissions to Emerging-Sigs☆11Apr 22, 2016Updated 9 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Web based application for managing your Sourcemod servers and users☆13Aug 8, 2014Updated 11 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- ripPE - section extractor and profiler for PE file analysis☆33Aug 8, 2014Updated 11 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago