GossiTheDog / scanning
☆160Updated last year
Alternatives and similar repositories for scanning:
Users that are interested in scanning are comparing it to the libraries listed below
- Get insights into the actual strength and quality of passwords in Active Directory.☆154Updated 8 months ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- ☆151Updated 3 years ago
- AzureADRecon is a tool which gathers information about the Azure Active Directory and generates a report which can provide a holistic pic…☆195Updated 3 months ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆144Updated last year
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- PoSh BloodHound Dog Whisperer☆189Updated last year
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆459Updated 8 months ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆190Updated 3 years ago
- User enumeration with Microsoft Teams API☆170Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Updated 2 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆318Updated 2 years ago
- Audit program for AzureAD☆147Updated last year
- Purple Teaming Attack & Hunt Lab - Terraform☆158Updated 3 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 3 years ago
- Password Hunter in Active Directory☆198Updated 2 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 3 years ago
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆91Updated 2 weeks ago
- ☆60Updated 3 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆216Updated 4 years ago
- A PowerShell module to deploy active directory decoy objects.☆226Updated 5 years ago
- Pushes Sysmon Configs☆88Updated 3 years ago
- A curated list of awesome BloodhoundAD resources☆230Updated 2 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆218Updated 2 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆231Updated 2 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆265Updated 11 months ago
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- Lateral Movement graph for Azure Active Directory☆120Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆66Updated 3 months ago