LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, modifications, and deletions for administrators and security researchers.
☆192Mar 25, 2026Updated 2 weeks ago
Alternatives and similar repositories for LDAP-Monitoring-Watchdog
Users that are interested in LDAP-Monitoring-Watchdog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration!☆912Oct 30, 2025Updated 5 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- NetworkAssessment: Network Compromise Assessment Tool☆94May 31, 2024Updated last year
- ☆35Dec 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆13Dec 21, 2023Updated 2 years ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆178Jul 6, 2024Updated last year
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- ☆166Feb 29, 2024Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- ☆74Apr 8, 2024Updated 2 years ago
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- ☆22Jul 15, 2023Updated 2 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- ☆89Jan 2, 2024Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆193Feb 24, 2026Updated last month
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆43Mar 31, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 3 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆516Aug 7, 2024Updated last year
- PoC☆12Apr 7, 2025Updated last year
- ☆188Jan 23, 2024Updated 2 years ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 7 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆150Aug 26, 2024Updated last year
- ☆58Mar 28, 2026Updated last week
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- Docker Remote API Scanner and Exploit☆179Nov 13, 2023Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆146May 17, 2024Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆151May 3, 2024Updated last year
- ☆136Feb 11, 2025Updated last year
- Windows Local Privilege Escalation Cookbook☆1,295Feb 5, 2026Updated 2 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Apr 6, 2024Updated 2 years ago