Analyzing AD domains for security risks related to user accounts
☆64Nov 11, 2022Updated 3 years ago
Alternatives and similar repositories for dc-sonar
Users that are interested in dc-sonar are comparing it to the libraries listed below
Sorting:
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆98Jan 13, 2026Updated last month
- ☆120Mar 28, 2025Updated 11 months ago
- ☆27Aug 18, 2023Updated 2 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆398Aug 15, 2025Updated 6 months ago
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- ☆38Jan 29, 2025Updated last year
- A WLAN red team framework.☆156Feb 9, 2026Updated 3 weeks ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 2 months ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆278Jan 14, 2023Updated 3 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Security checks for your researches☆34Nov 22, 2020Updated 5 years ago
- Data visualization for blue teams☆126Jan 20, 2023Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- ☆80Apr 18, 2023Updated 2 years ago
- Extensible Azure Security Tool - Documentation☆83Jun 1, 2023Updated 2 years ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆500Jan 23, 2023Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆483Jul 9, 2024Updated last year
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 6 years ago
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- AD ACL abuse☆388Sep 11, 2025Updated 5 months ago
- ☆252Sep 28, 2023Updated 2 years ago
- BloodHound PowerShell client☆77Dec 10, 2025Updated 2 months ago
- Malware vulnerability intel tool for third-party attackers☆122Oct 24, 2024Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆110Dec 11, 2023Updated 2 years ago
- Python scanner for CVE-2022-47966. Supports ~10 of the 24 affected products.☆28Feb 8, 2023Updated 3 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆671Oct 23, 2025Updated 4 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆50Feb 22, 2024Updated 2 years ago
- BlueHound - pinpoint the security issues that actually matter☆761Jul 12, 2023Updated 2 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆80Jan 22, 2025Updated last year
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year