☆49Jan 14, 2025Updated last year
Alternatives and similar repositories for Active-Directory
Users that are interested in Active-Directory are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wireless Network Security Analysis Tool☆16Apr 27, 2025Updated 10 months ago
- ☆13Mar 23, 2023Updated 3 years ago
- ad-exchange powershell scripts☆29Sep 23, 2025Updated 6 months ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- ☆11Oct 7, 2025Updated 5 months ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- A curated list of FOSS software appliances for building a SOC☆18Jan 11, 2021Updated 5 years ago
- ☆10Jul 8, 2024Updated last year
- Security Operation Center Lab☆20Oct 8, 2024Updated last year
- ☆13Mar 9, 2017Updated 9 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆58Mar 25, 2020Updated 5 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- ☆20Aug 4, 2019Updated 6 years ago
- ☆23Nov 18, 2021Updated 4 years ago
- Enumeration from a non-domain joined Windows computer☆33Oct 20, 2024Updated last year
- ☆35Mar 18, 2026Updated last week
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- Chista | Open Threat Intelligence Framework☆63May 18, 2024Updated last year
- ☆13Jun 14, 2024Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- A small wifi penetration testing tool-kit☆11Jul 21, 2023Updated 2 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- en temel anlamıyla yazılım öğrenme sürecini anlamaya ve anlatmaya çalışmak☆12Dec 3, 2020Updated 5 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- CVE-2025-68428 Proof of Concept☆24Jan 8, 2026Updated 2 months ago
- Python'un scapy modülü kullanılarak aynı ağda bulunan cihazların ip ve mac adreslerini listeyen script.☆11Jun 24, 2020Updated 5 years ago
- Fast and lightweight Kubernetes IDE☆140Dec 15, 2025Updated 3 months ago
- ☆12Sep 6, 2020Updated 5 years ago
- Simulate Windows EXE for Malware Research!☆19Sep 4, 2024Updated last year
- ☆34Apr 16, 2022Updated 3 years ago
- The purpose of this repo is to share my research☆14Apr 7, 2025Updated 11 months ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- Arduino Kitabimizda Gecen Ornek Kodlar☆10Feb 23, 2017Updated 9 years ago
- All in One Recon Tool for Bug Bounty☆16Dec 30, 2022Updated 3 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Jan 23, 2025Updated last year
- ☆14Feb 7, 2024Updated 2 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- Nmap Dashboard Mini Project☆630Jun 12, 2024Updated last year