Elymaro / rootscanLinks
Speed up your pentest enumeration
☆83Updated 3 months ago
Alternatives and similar repositories for rootscan
Users that are interested in rootscan are comparing it to the libraries listed below
Sorting:
- Identify the accounts most vulnerable to dictionary attacks☆121Updated 9 months ago
- GLPI vulnerabilities checking tool☆154Updated last month
- Active Directory Mindmap Recipes: A Compromise à la Carte☆143Updated 4 months ago
- Assess the security of your Active Directory with few or all privileges.☆336Updated last week
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆317Updated 9 months ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Updated 10 months ago
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆47Updated 3 weeks ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Updated last year
- Docker images of the Exegol project☆123Updated last week
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Updated 2 years ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆141Updated 2 months ago
- ☆317Updated last year
- Captures network traffic app made in Rust.☆75Updated this week
- Lab used for workshop and CTF☆449Updated this week
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆124Updated 3 weeks ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated last year
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Updated last year
- Advanced Active Directory network topology analyzer with SMB validation, multiple authentication methods (password/NTLM/Kerberos), and co…☆648Updated 2 months ago
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆437Updated 2 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 months ago
- Hardening Active Directory version 2☆370Updated last month
- Find CVEs associated to Linux and public exploits on github☆119Updated 9 months ago
- ☆100Updated 6 months ago
- The tool 𝗲𝗻𝘂𝗺𝘅 is a framework built for Kali Linux that uses a plethora of existing pentesting tools as plugins in order to simplify…☆38Updated last year
- ☆12Updated last week
- ☆137Updated 7 months ago
- ☆55Updated last year
- ☆39Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆154Updated last month