ADDS (Active Directory Domain Services)
☆28Mar 25, 2026Updated last month
Alternatives and similar repositories for ADDS_Tool
Users that are interested in ADDS_Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Apr 8, 2026Updated 3 weeks ago
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆27Jan 4, 2022Updated 4 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆15Jul 13, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 6 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Feb 6, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 4 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Web-based GUI for TorBox☆19Jun 13, 2023Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- Drishti is an information collection tool (OSINT) which aims to carry out Basic Information.☆49Feb 3, 2022Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Attack Active Directory Trusts with a single tool☆13Jan 15, 2025Updated last year
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆50Jul 28, 2025Updated 9 months ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated 2 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆82Sep 15, 2022Updated 3 years ago
- Sattools tool for Icone Iron series (Formerly called AutoInstaller)☆17Feb 10, 2024Updated 2 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆24Feb 15, 2026Updated 2 months ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- Acunetix automate telegram bot☆11Jul 19, 2024Updated last year
- SubDomain Finder☆13Nov 9, 2021Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆77Nov 19, 2024Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago