GossiTheDog / scanning
☆158Updated last year
Related projects ⓘ
Alternatives and complementary repositories for scanning
- Get insights into the actual strength and quality of passwords in Active Directory.☆151Updated 4 months ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆144Updated 3 years ago
- ☆149Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆440Updated 2 years ago
- Find and notify users in your Active Directory with weak passwords☆102Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆450Updated 4 months ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆190Updated 3 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆216Updated 2 years ago
- Password Hunter in Active Directory☆196Updated last year
- AzureADRecon is a tool which gathers information about the Azure Active Directory and generates a report which can provide a holistic pic…☆188Updated last month
- PoSh BloodHound Dog Whisperer☆188Updated last year
- Active Directory Lab for Penetration Testing☆49Updated 3 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆158Updated 2 years ago
- A collection of Powershell scripts that will help automate the build process for a Marvel domain.☆144Updated 9 months ago
- User enumeration with Microsoft Teams API☆166Updated 3 years ago
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆88Updated 11 months ago
- ☆59Updated 3 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆171Updated 2 years ago
- Lateral Movement graph for Azure Active Directory☆122Updated last year
- Audit program for AzureAD☆145Updated last year
- Material for the "Hands-On BloodHound" Workshop☆106Updated 3 years ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆147Updated 2 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆215Updated 4 years ago
- ☆354Updated 3 months ago
- A curated list of awesome BloodhoundAD resources☆227Updated 2 years ago
- A PowerShell module to deploy active directory decoy objects.☆223Updated 5 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆227Updated 2 years ago