Hunt Smarter, Hunt Harder
☆191Mar 14, 2026Updated last month
Alternatives and similar repositories for ADTrapper
Users that are interested in ADTrapper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell-based Windows Server Security Audit Engine by Cyb3rint3l Labs. Measures alignment with the NIS2 directive and maps findings to…☆42Feb 1, 2026Updated 2 months ago
- [About]@{Name="FightingEntropy"; Version="2024.1.0"; Company="Secure Digits Plus LLC"; Description="Beginning the fight against ID theft …☆10Updated this week
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 9 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆44Sep 16, 2025Updated 7 months ago
- Veeam Hardening Script for Windows (CIS contents)☆22Nov 10, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Details around how to setup WinRM Certificate Authentication for use in Ansible☆22Jul 18, 2024Updated last year
- 🛡️ Assign AD permissions via PowerShell templates — Simplify and standardize AD delegation with reusable PowerShell templates.☆25Apr 3, 2026Updated last week
- User provisioning from BambooHR to Entra ID (Azure Active Directory)☆14Mar 27, 2026Updated 2 weeks ago
- Your Browser-based EVTX Companion☆115Mar 2, 2026Updated last month
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆183May 19, 2025Updated 10 months ago
- ☆13Nov 18, 2025Updated 4 months ago
- Super light, super fast, unlimited search idea☆25Aug 3, 2025Updated 8 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆323Mar 27, 2025Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆260Aug 13, 2024Updated last year
- Security tool against dependency typosquatting attacks☆55Updated this week
- Tokenex is a Go library that securely exchanges identity tokens for temporary cloud credentials, with built-in support for AWS, GCP, Azur…☆78Apr 8, 2026Updated last week
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162Jan 3, 2026Updated 3 months ago
- ☆36Aug 7, 2021Updated 4 years ago
- ☆22Mar 4, 2025Updated last year
- Show PIM role to solve a task - and group to activate the needed permission☆15May 22, 2025Updated 10 months ago
- A comprehensive Windows security auditing and threat detection toolkit. Features 58 production-ready PowerShell functions organized into …☆77Oct 20, 2025Updated 5 months ago
- Repository for AsBuiltReport Microsoft Active Directory module☆168Apr 4, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆96Updated this week
- ☆39Jul 31, 2025Updated 8 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆129Updated this week
- PowerShell Script for Agentless Incident Response☆25Apr 5, 2018Updated 8 years ago
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- Man-in-the-middle made easy!☆15Mar 25, 2020Updated 6 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆51Mar 10, 2025Updated last year
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- This is the offical Repository for the Access Package Builder Web App.☆19Jan 26, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Proof of Concept (PoC) .NET tool for remotely killing EDR with WDAC☆426Sep 29, 2025Updated 6 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆153Jan 25, 2026Updated 2 months ago
- This repo is about Active Directory Advanced Threat Hunting☆650Feb 17, 2025Updated last year
- JUMP-IN is an all-in-one macOS application that simplifies the migration between MDM solutions, specifically designed to help organizatio…☆10Apr 21, 2025Updated 11 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- Evtx Log (xml) Browser☆59Mar 12, 2023Updated 3 years ago
- ☆23Mar 11, 2014Updated 12 years ago