Monitor your PingCastle scans to highlight the rule diff between two scans
☆158Feb 19, 2026Updated last month
Alternatives and similar repositories for PingCastle-Notify
Users that are interested in PingCastle-Notify are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- ☆22Mar 4, 2025Updated last year
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated last month
- ScriptSentry finds misconfigured and dangerous logon scripts.☆625Feb 16, 2026Updated last month
- A small tool built to find and fix common misconfigurations in Active Directory Certificate Services.☆1,493Feb 18, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Mar 13, 2025Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,514Mar 18, 2026Updated 3 weeks ago
- This repo is about Active Directory Advanced Threat Hunting☆650Feb 17, 2025Updated last year
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- Active Directory delegation management tool☆466Oct 25, 2025Updated 5 months ago
- This is a powershell module to help implement the AD Tier Model☆15Feb 17, 2026Updated last month
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,150Feb 21, 2026Updated last month
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆319Feb 16, 2026Updated last month
- ☆18Feb 2, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Table of AD and Azure assets and whether they belong to Tier Zero☆261Mar 2, 2026Updated last month
- A tiny tool built to help AD Admins tame the Protected Users group.☆140Mar 22, 2026Updated 2 weeks ago
- Identify the attack paths in BloodHound breaking your AD tiering☆327Nov 6, 2022Updated 3 years ago
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆139Sep 28, 2024Updated last year
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated last year
- BlueHound - pinpoint the security issues that actually matter☆759Jul 12, 2023Updated 2 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Jun 12, 2024Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 3 months ago
- PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains…☆995Oct 15, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Some scripts to abuse kerberos using Powershell☆356Jul 27, 2023Updated 2 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆483Jul 9, 2024Updated last year
- 🛡️ Assign AD permissions via PowerShell templates — Simplify and standardize AD delegation with reusable PowerShell templates.☆25Apr 3, 2026Updated last week
- ☆202Feb 27, 2026Updated last month
- A BloodHound collector for Microsoft Configuration Manager☆396Jul 7, 2025Updated 9 months ago
- ☆89Updated this week
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165May 6, 2023Updated 2 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆890Apr 8, 2025Updated last year
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆442Jan 4, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆300Mar 28, 2026Updated 2 weeks ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆352Mar 19, 2026Updated 3 weeks ago
- PowerShell toolkit for AD CS auditing based on the PSPKI toolkit.☆924Feb 28, 2024Updated 2 years ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,494Apr 3, 2026Updated last week
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆193Feb 5, 2023Updated 3 years ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆374Mar 24, 2026Updated 2 weeks ago
- An ADCS honeypot to catch attackers in your internal network.☆327Jun 27, 2024Updated last year