Elymaro / rootscan
Speed up your pentest enumeration
☆83Updated last month
Alternatives and similar repositories for rootscan:
Users that are interested in rootscan are comparing it to the libraries listed below
- GLPI vulnerabilities checking tool☆103Updated last week
- Identify the accounts most vulnerable to dictionary attacks☆119Updated 2 weeks ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆19Updated 3 months ago
- Assess the security of your Active Directory with few or all privileges.☆312Updated this week
- Active Directory Mindmap Recipes: A Compromise à la Carte☆77Updated 2 weeks ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated 2 months ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆28Updated last month
- Lab used for workshop and CTF☆178Updated 2 months ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆97Updated last week
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆214Updated 3 weeks ago
- SwitchToOpen - The open source shift☆53Updated last month
- AzureKitty is an Office 365 and Azure configuration audit tool☆14Updated last year
- Intelligence Blocklists: Phishing, Scam Domains☆25Updated this week
- Docker images of the Exegol project☆104Updated last week
- ☆174Updated 4 months ago
- ☆92Updated 3 weeks ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆138Updated 11 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts.☆139Updated this week
- ☆160Updated last week
- ☆37Updated 6 months ago
- ☆12Updated 2 months ago
- ☆55Updated 10 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year
- HookPhish is a Python script designed to aid in the detection of phishing websites☆35Updated last year
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆265Updated 2 months ago
- Hardening Active Directory version 2☆313Updated last month
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆193Updated 3 months ago
- Protect your data in minutes !☆117Updated 5 months ago
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 3 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 6 months ago