Analyzing AD domains for security risks related to user accounts
☆64Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for dc-sonar
Users that are interested in dc-sonar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Extensible Azure Security Tool - Documentation☆83Jun 1, 2023Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆100Jan 13, 2026Updated 4 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆404Aug 15, 2025Updated 9 months ago
- A WLAN red team framework.☆162Feb 9, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Find Microsoft Exchange instance for a given domain and identify the exact version☆190Jan 30, 2023Updated 3 years ago
- Data visualization for blue teams☆127Jan 20, 2023Updated 3 years ago
- ☆121Mar 28, 2025Updated last year
- AD ACL abuse☆400Sep 11, 2025Updated 8 months ago
- Cloud Exploit Framework☆112May 11, 2022Updated 4 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- ☆80Apr 18, 2023Updated 3 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆34Aug 26, 2021Updated 4 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆487Oct 14, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆283Jan 14, 2023Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- BlueHound - pinpoint the security issues that actually matter☆765Jul 12, 2023Updated 2 years ago
- Security checks for your researches☆35Nov 22, 2020Updated 5 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆122Dec 13, 2025Updated 5 months ago
- Exchange Online Protection & Microsoft Defender For Office 365 Hardering Tool☆12Jan 14, 2023Updated 3 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Dec 26, 2023Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆114Mar 31, 2026Updated last month
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆27May 6, 2025Updated last year
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆504Jan 23, 2023Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆487Jul 9, 2024Updated last year
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 4 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Your template-based BloodHound terminal companion tool☆450Jan 21, 2026Updated 4 months ago
- ☆255Sep 28, 2023Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆127Updated this week
- ☆28Mar 29, 2022Updated 4 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆141Sep 14, 2024Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆298Aug 18, 2023Updated 2 years ago