The home of the SDDLMaker
☆28Jan 13, 2025Updated last year
Alternatives and similar repositories for SDDLMaker
Users that are interested in SDDLMaker are comparing it to the libraries listed below
Sorting:
- Validates Sigma rules using the JSON schema☆22Mar 18, 2024Updated last year
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- AppLocker Policy Generator☆25Aug 25, 2025Updated 6 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- A simple tool designed to create Atomic Red Team tests with ease.☆49Mar 11, 2025Updated 11 months ago
- Windows Security Descriptor Definition Language (SDDL) parser and formatter☆20Jun 8, 2020Updated 5 years ago
- VirtualBox Web Control Panel is a lightweight HTTP server script providing a simple web interface to list, control, and interact with Vir…☆25Apr 15, 2025Updated 10 months ago
- a tiny program to consume from ETW providers for research☆54Jan 4, 2025Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆209Nov 25, 2025Updated 3 months ago
- WER Server☆19Feb 26, 2017Updated 9 years ago
- ☆61Feb 24, 2026Updated last week
- A lightweight Windows Prefetch file parser to extract programs' execution history☆67Jan 12, 2026Updated last month
- Exhaustive search and flexible filtering of Active Directory ACEs.☆75Nov 10, 2025Updated 3 months ago
- ☆141Sep 9, 2025Updated 5 months ago
- The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Acces…☆138Sep 28, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 6 months ago
- ACL Viewer for Windows☆133May 4, 2025Updated 10 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆62Jul 29, 2025Updated 7 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- Tests your API automatically for common API vulnerabilities. Project is still Work In Progress. PRs are appreciated.☆34Apr 12, 2024Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆114Jan 25, 2026Updated last month
- Enrich your investigations on IPs, Domains etc. with OSINT☆58Apr 4, 2024Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆39Sep 12, 2024Updated last year
- ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incide…☆60Feb 7, 2026Updated 3 weeks ago
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- The Linux DFIR Collector is a stand-alone collection tool for Gnu / Linux. Dump artifacts in json format with very few impacts on the hos…☆33Mar 9, 2022Updated 3 years ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Feb 23, 2026Updated last week
- ☆14Dec 11, 2025Updated 2 months ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- ☆41Sep 9, 2023Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆47Sep 18, 2025Updated 5 months ago