Analyzing AD domains for security risks related to user accounts
☆64Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for dc-sonar
Users that are interested in dc-sonar are comparing it to the libraries listed below
Sorting:
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Extensible Azure Security Tool - Documentation☆83Jun 1, 2023Updated 2 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated 2 months ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Aug 15, 2025Updated 7 months ago
- A WLAN red team framework.☆157Feb 9, 2026Updated last month
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Data visualization for blue teams☆126Jan 20, 2023Updated 3 years ago
- AD ACL abuse☆393Sep 11, 2025Updated 6 months ago
- ☆120Mar 28, 2025Updated 11 months ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆34Aug 26, 2021Updated 4 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆282Jan 14, 2023Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- BlueHound - pinpoint the security issues that actually matter☆761Jul 12, 2023Updated 2 years ago
- A Target Tracking , NoteTaking , CheckLists and Data Management GUI App for Bug Hunter's and Pentesters.☆42Jun 19, 2022Updated 3 years ago
- Security checks for your researches☆34Nov 22, 2020Updated 5 years ago
- Exchange Online Protection & Microsoft Defender For Office 365 Hardering Tool☆12Jan 14, 2023Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 3 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Dec 26, 2023Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆112Dec 11, 2023Updated 2 years ago
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆27May 6, 2025Updated 10 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆501Jan 23, 2023Updated 3 years ago
- Analyst Tool to automate some of an analyst's daily investigation tasks. In both python script and Jupyter Notebook format.☆15Nov 24, 2025Updated 3 months ago
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆484Jul 9, 2024Updated last year
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 2 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- Your template-based BloodHound terminal companion tool☆447Jan 21, 2026Updated 2 months ago
- ☆254Sep 28, 2023Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆128Feb 21, 2026Updated last month
- ☆28Mar 29, 2022Updated 3 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago