Elymaro / rootscanLinks
Speed up your pentest enumeration
☆83Updated 4 months ago
Alternatives and similar repositories for rootscan
Users that are interested in rootscan are comparing it to the libraries listed below
Sorting:
- Identify the accounts most vulnerable to dictionary attacks☆121Updated 10 months ago
- GLPI vulnerabilities checking tool☆157Updated 2 months ago
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆50Updated last month
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- ☆13Updated last month
- Assess the security of your Active Directory with few or all privileges.☆341Updated last week
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Updated 11 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆318Updated 10 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Updated 2 years ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆148Updated 5 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Updated last year
- ☆317Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 3 months ago
- An automated NMAP python script☆48Updated 11 months ago
- Docker images of the Exegol project☆123Updated 2 weeks ago
- Captures network traffic app made in Rust.☆76Updated 2 weeks ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆129Updated last month
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆448Updated 3 months ago
- ☆55Updated last year
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆374Updated last year
- Find CVEs associated to Linux and public exploits on github☆119Updated 9 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Updated 2 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year
- List of tools and resources for pentesting Microsoft Active Directory☆114Updated 7 months ago
- ☆201Updated 7 months ago
- ☆144Updated 8 months ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆148Updated this week
- ☆176Updated 10 months ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆67Updated 3 months ago
- Lab used for workshop and CTF☆487Updated this week