Speed up your pentest enumeration
☆83Oct 5, 2025Updated 6 months ago
Alternatives and similar repositories for rootscan
Users that are interested in rootscan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆23Jan 4, 2025Updated last year
- Protect your data in minutes !☆125Nov 5, 2024Updated last year
- Data-Shield IPv4 Blocklist Community provides an official, curated registry of IPv4 addresses identified as malicious. Updated continuous…☆555Updated this week
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated last year
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆129Dec 15, 2025Updated 3 months ago
- SwitchToOpen - The open source shift☆305Nov 21, 2025Updated 4 months ago
- ☆13Jan 5, 2026Updated 3 months ago
- AzureKitty is an Office 365 and Azure configuration audit tool☆15Jan 28, 2024Updated 2 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆118Mar 27, 2026Updated 2 weeks ago
- Hardening Active Directory version 2☆382Dec 10, 2025Updated 4 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- This module provides an easy way to cleanup Active Directory from dead/old objects based on various criteria. It can also disable, move o…☆138Mar 10, 2026Updated last month
- Cerberus is a Python client-server program to implement a complex port knocking system preventing playback attacks on an exposed server.☆74Jul 16, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Mar 24, 2026Updated 2 weeks ago
- ☆56Jan 22, 2025Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 2 years ago
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆344Updated this week
- Active Directory Mindmap Recipes: A Compromise à la Carte☆151Sep 4, 2025Updated 7 months ago
- This tool was created to address a common blind spot in corporate security: chat platforms. During penetration tests and red team engage…☆56Dec 21, 2025Updated 3 months ago
- ☆39Oct 18, 2024Updated last year
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆995Oct 15, 2025Updated 5 months ago
- Captures network traffic app made in Rust.☆79Mar 31, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Assess the security of your Active Directory with few or all privileges.☆366Mar 16, 2026Updated 3 weeks ago
- DPULSE - Tool for complex approach to domain OSINT☆161Mar 19, 2026Updated 3 weeks ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆323Mar 27, 2025Updated last year
- HookPhish is a Python script designed to aid in the detection of phishing websites☆40Nov 15, 2023Updated 2 years ago
- Windows Active DIrectory Pentesting documentation.☆20Jun 14, 2024Updated last year
- ☆169Nov 3, 2025Updated 5 months ago
- A user-friendly solution to transfer files through a physical diode using the Lidi utility, complete with data retention, file history, u…☆154Feb 6, 2026Updated 2 months ago
- GLPI vulnerabilities checking tool☆164Mar 30, 2026Updated last week
- Command line tool designed to set up, start and maintain Clear NDR installation.☆33Mar 13, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆14Aug 20, 2024Updated last year
- Fully featured and community-driven hacking environment☆2,967Mar 25, 2026Updated 2 weeks ago
- Mapping the information system / Cartographie du système d'information☆501Apr 4, 2026Updated last week
- Root module for creating Tier Model / Delegation Model on Active Directory☆20Aug 28, 2025Updated 7 months ago
- ☆65Apr 28, 2024Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- Lab used for workshop and CTF☆510Feb 3, 2026Updated 2 months ago