ADDS (Active Directory Domain Services)
☆28Feb 3, 2026Updated last month
Alternatives and similar repositories for ADDS_Tool
Users that are interested in ADDS_Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Updated this week
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆26Jan 4, 2022Updated 4 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 3 years ago
- A powerful reverse shell generator☆46Mar 18, 2026Updated last week
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- Bypass Cisco Umbrella DNS Proxy Firewall Restrictions☆58Sep 24, 2023Updated 2 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Feb 6, 2022Updated 4 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Fully Undetectable telegram Rat dropper☆35Nov 16, 2020Updated 5 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- Drishti is an information collection tool (OSINT) which aims to carry out Basic Information.☆49Feb 3, 2022Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- A lightweight ducky script generator written in python.☆36Feb 6, 2021Updated 5 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- A Kubernetes challenge type plugin for CTFd☆16Nov 21, 2025Updated 4 months ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆49Jul 28, 2025Updated 7 months ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆83Sep 15, 2022Updated 3 years ago
- Sattools tool for Icone Iron series (Formerly called AutoInstaller)☆17Feb 10, 2024Updated 2 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- ☆24Feb 15, 2026Updated last month
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- SubDomain Finder☆13Nov 9, 2021Updated 4 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆39Mar 5, 2026Updated 2 weeks ago