AdrianVollmer / Crack-O-Matic
Find and notify users in your Active Directory with weak passwords
☆101Updated 3 years ago
Alternatives and similar repositories for Crack-O-Matic:
Users that are interested in Crack-O-Matic are comparing it to the libraries listed below
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆144Updated last year
- User enumeration with Microsoft Teams API☆170Updated 3 years ago
- ☆160Updated last year
- Identify Azure blobs using a wordlist of account name and container name strings☆39Updated last week
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆130Updated 2 years ago
- ☆77Updated 5 years ago
- Pushes Sysmon Configs☆88Updated 3 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆158Updated 3 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆65Updated 3 months ago
- ☆60Updated 3 years ago
- Fast offline auditing of Active Directory passwords using Python.☆163Updated 7 months ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆190Updated 3 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 3 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆102Updated last month
- Microsoft Threat Protection Advance Hunting Cheat Sheet☆79Updated 4 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆114Updated last year
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- ☆151Updated 3 years ago
- The PoLRBear Project☆35Updated 4 years ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆154Updated 8 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆109Updated 7 months ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- ☆41Updated last year
- An active directory laboratory for penetration testing.☆130Updated 4 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated last year
- ☆50Updated 2 months ago