Tool with a collection of query files to explore Microsoft Active Directory
☆18Jul 20, 2023Updated 2 years ago
Alternatives and similar repositories for rastreator
Users that are interested in rastreator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆21Apr 16, 2026Updated 2 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆41Dec 5, 2025Updated 5 months ago
- A Frida MCP server to enable autonomous AI assistance for Android instrumentation☆99Feb 8, 2026Updated 2 months ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago
- Evaluating and Reporting on Azure Active Directory/Active Directory Users Security Posture☆29May 8, 2019Updated 6 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 10 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 10 months ago
- Simple recon tool automates your recon process☆16Apr 15, 2023Updated 3 years ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆70Feb 17, 2026Updated 2 months ago
- ☆12Apr 17, 2022Updated 4 years ago
- this tool take a list of subdomains and give you the ip for each☆20Oct 9, 2020Updated 5 years ago
- A webshell plugin and interactive shell for pentesting JoGet application.☆14May 19, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- EmailSecCheck is a lightweight Python utility used to check for common SPF/DMARC misconfigurations that may allow for email spoofing.☆21May 9, 2025Updated 11 months ago
- Tool to automate the whole process of environment in android audits☆14Apr 30, 2019Updated 7 years ago
- Load the evilDLL from socket connection without touch disk☆15Aug 27, 2021Updated 4 years ago
- A stealthy reverse shell built with native PowerShell and Server-Sent Events (SSE). No polling. No sockets. Just pure HTTP and real-time …☆22Apr 23, 2025Updated last year
- ☆14Apr 29, 2019Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Sep 18, 2020Updated 5 years ago
- Learning Various Process Injection Techniques☆18Apr 4, 2019Updated 7 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆20Jan 12, 2022Updated 4 years ago
- Process Hollowing POC in CPP☆19Oct 29, 2020Updated 5 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- Extract transform load CLI tool for extracting small and middle data volume from sources (databases, csv files, xls files, gspreadsheets)…☆11Mar 14, 2026Updated last month
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- IPS Suricata2MikroTik -CE- is a module for Suricata to read eve.json file and search specifics alert to block the source. This connect to…☆33Feb 3, 2023Updated 3 years ago
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- yara-python-dex enabled wheels☆11Aug 31, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AWS S3 Sensitive Data Search☆35Jan 16, 2022Updated 4 years ago
- Misc stuff from internet☆12Apr 13, 2026Updated 3 weeks ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Axon provides powerful and concise models for interactive simulations, based on observable Properties and related patterns.☆12Apr 15, 2026Updated 3 weeks ago
- A command-line utility for generating optimum polygon label coordinates from GeoJSON☆12Mar 20, 2023Updated 3 years ago
- Autonomous AI-powered security scanner — multi-agent vulnerability detection, exploitation, and validation engine☆99Apr 7, 2026Updated 3 weeks ago
- ☆16Jun 16, 2021Updated 4 years ago