GossiTheDog / scanningLinks
☆169Updated last week
Alternatives and similar repositories for scanning
Users that are interested in scanning are comparing it to the libraries listed below
Sorting:
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆155Updated last year
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆147Updated 4 years ago
- Fast offline auditing of Active Directory passwords using Python.☆164Updated 11 months ago
- ☆151Updated 3 years ago
- Active Directory Lab for Penetration Testing☆53Updated 4 years ago
- AzureADRecon is a tool which gathers information about the Azure Active Directory and generates a report which can provide a holistic pic…☆206Updated 6 months ago
- ☆64Updated 4 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 2 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Updated 2 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆147Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆276Updated last year
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆236Updated 3 years ago
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- User enumeration with Microsoft Teams API☆173Updated 4 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆159Updated 3 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 3 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆469Updated last year
- Find exposed data in Azure with this public blob scanner☆337Updated last year
- Audit program for AzureAD☆149Updated 2 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆154Updated 3 years ago
- PoSh BloodHound Dog Whisperer☆191Updated 2 years ago
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆92Updated 3 months ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated 9 months ago
- A PowerShell module to deploy active directory decoy objects.☆232Updated 5 years ago
- Password Hunter in Active Directory☆198Updated 2 years ago
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- nse script to inject jndi payloads☆46Updated 3 years ago