Elymaro / rootscanLinks
Speed up your pentest enumeration
☆84Updated 3 weeks ago
Alternatives and similar repositories for rootscan
Users that are interested in rootscan are comparing it to the libraries listed below
Sorting:
- GLPI vulnerabilities checking tool☆116Updated last month
- Identify the accounts most vulnerable to dictionary attacks☆119Updated 2 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆20Updated 4 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆115Updated 2 months ago
- Assess the security of your Active Directory with few or all privileges.☆316Updated last month
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆29Updated 2 months ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆101Updated last month
- ☆95Updated 2 months ago
- Docker images of the Exegol project☆108Updated this week
- SwitchToOpen - The open source shift☆53Updated 3 weeks ago
- Ce dépôt est un simple 'template' de ressources pour Exegol et Tmux avec une installation simplifiée.☆19Updated last month
- ☆37Updated 7 months ago
- ☆12Updated 3 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆148Updated 3 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 5 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆227Updated 2 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆139Updated last year
- Lab used for workshop and CTF☆239Updated last week
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆153Updated last month
- ThreatSeeker: Threat Hunting via Windows Event Logs☆121Updated 2 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 8 months ago
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Updated 2 years ago
- HookPhish is a Python script designed to aid in the detection of phishing websites☆37Updated last year
- ☆55Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆121Updated 4 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆108Updated 2 months ago
- Azure mindmap for penetration tests☆185Updated last year
- ☆312Updated last year
- Hardening Active Directory version 2☆322Updated 2 months ago
- ☆166Updated last month