Elymaro / rootscanLinks
Speed up your pentest enumeration
☆83Updated 3 months ago
Alternatives and similar repositories for rootscan
Users that are interested in rootscan are comparing it to the libraries listed below
Sorting:
- Identify the accounts most vulnerable to dictionary attacks☆121Updated 10 months ago
- GLPI vulnerabilities checking tool☆157Updated 2 months ago
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆50Updated last month
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Updated 10 months ago
- ☆13Updated 3 weeks ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆318Updated 10 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆148Updated 5 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- Assess the security of your Active Directory with few or all privileges.☆340Updated last week
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Updated 2 years ago
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆448Updated 3 months ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆128Updated last month
- Captures network traffic app made in Rust.☆76Updated last week
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 3 months ago
- ☆317Updated last year
- ☆55Updated last year
- ☆39Updated last year
- Docker images of the Exegol project☆123Updated last week
- Find CVEs associated to Linux and public exploits on github☆119Updated 9 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Updated 2 months ago
- Hardening Active Directory version 2☆373Updated last month
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year
- Lab used for workshop and CTF☆481Updated 3 weeks ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆147Updated 2 weeks ago
- AzureKitty is an Office 365 and Azure configuration audit tool☆15Updated 2 years ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆386Updated 2 weeks ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆67Updated 3 months ago
- List of tools and resources for pentesting Microsoft Active Directory☆114Updated 7 months ago
- ☆176Updated 9 months ago