Elymaro / rootscan
Speed up your pentest enumeration
☆82Updated 2 months ago
Alternatives and similar repositories for rootscan:
Users that are interested in rootscan are comparing it to the libraries listed below
- Identify the accounts most vulnerable to dictionary attacks☆117Updated 7 months ago
- Intelligence Blocklists: Phishing, Scam Domains☆23Updated this week
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆88Updated 3 weeks ago
- Assess the security of your Active Directory with few or all privileges.☆300Updated this week
- Lab used for workshop and CTF☆174Updated last month
- Docker images of the Exegol project☆101Updated this week
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆206Updated 2 months ago
- ☆38Updated 4 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated last month
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Updated 2 years ago
- ☆89Updated this week
- Hardening Active Directory version 2☆305Updated 2 months ago
- SwitchToOpen - The open source shift☆52Updated 3 weeks ago
- ☆174Updated 3 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- ☆140Updated 3 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- ☆55Updated 9 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆137Updated 9 months ago
- Azure mindmap for penetration tests☆179Updated last year
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 5 months ago
- ☆103Updated last year
- ☆310Updated 11 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆259Updated last month
- Protect your data in minutes !☆116Updated 4 months ago
- DFIR ORC PARSER PROJECT☆25Updated 2 weeks ago