NebulousAD automated credential auditing tool.
☆154Apr 8, 2020Updated 6 years ago
Alternatives and similar repositories for nebulousAD
Users that are interested in nebulousAD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Find specific users in active directory via their username and logon IP address☆386Mar 21, 2020Updated 6 years ago
- Tool to find SMTP servers vulnerable to open relay☆82Feb 13, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Automated 802.1x Bypass☆89Mar 11, 2020Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Domain user enumeration tool☆217Nov 2, 2023Updated 2 years ago
- ☆25May 9, 2021Updated 4 years ago
- PowerShell module for Mimikatz☆215Dec 28, 2019Updated 6 years ago
- A passive subdomain finder☆335Apr 19, 2023Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆138Jun 6, 2019Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆543Apr 14, 2021Updated 5 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆250Jun 19, 2024Updated last year
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆37Feb 11, 2020Updated 6 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆325Mar 26, 2019Updated 7 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Dec 8, 2022Updated 3 years ago
- small python3 tool to check common vulnerabilities in SMTP servers☆164Apr 21, 2023Updated 3 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Still in dev mode☆12Apr 24, 2018Updated 8 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 5 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Jun 30, 2025Updated 10 months ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- an asynchronous target enumeration tool☆249Dec 8, 2022Updated 3 years ago
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆97Aug 13, 2022Updated 3 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Updated this week