PenCheckerTeam / PenCheckerLinks
☆37Updated 8 months ago
Alternatives and similar repositories for PenChecker
Users that are interested in PenChecker are comparing it to the libraries listed below
Sorting:
- Speed up your pentest enumeration☆84Updated last month
- Identify the accounts most vulnerable to dictionary attacks☆120Updated 3 months ago
- WAZUH Sentinel AD - Ultimate rules for Wazuh☆27Updated 3 weeks ago
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆105Updated 2 weeks ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆31Updated 4 months ago
- GLPI vulnerabilities checking tool☆132Updated last month
- SwitchToOpen - The open source shift☆197Updated this week
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆262Updated 2 months ago
- Hardening Active Directory version 2☆329Updated 4 months ago
- Intelligence IPv4 Blocklist. DST = Europa☆283Updated this week
- Powershell commands for enumeration in Windows Active Directory environment.☆42Updated 2 years ago
- Assess the security of your Active Directory with few or all privileges.☆320Updated last month
- ☆313Updated last year
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆517Updated 11 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websites☆37Updated last year
- Active Directory Mindmap Recipes: A Compromise à la Carte☆132Updated last month
- AzureKitty is an Office 365 and Azure configuration audit tool☆15Updated last year
- Ce dépôt est un simple 'template' de ressources pour Exegol et Tmux avec une installation simplifiée.☆21Updated last week
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Updated 2 years ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆21Updated 6 months ago
- Pre-Built Vulnerable Environments Based on Docker-Compose☆35Updated 6 months ago
- NetProbe: Network Probe☆161Updated 9 months ago
- Docker images of the Exegol project☆109Updated this week
- Information Gatherer & Webapps Exploiter☆155Updated 10 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆121Updated 2 years ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆257Updated 3 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 weeks ago
- Command Line Sock Puppet Creator for Investigators.☆81Updated 3 months ago
- Protect your data in minutes !☆120Updated 8 months ago
- ☆161Updated 9 months ago