Sneakysecdoggo / WynisLinks
Audit Windows Security with best Practice
☆184Updated 8 months ago
Alternatives and similar repositories for Wynis
Users that are interested in Wynis are comparing it to the libraries listed below
Sorting:
- Active Directory Lab for Penetration Testing☆51Updated 4 years ago
- Password Hunter in Active Directory☆198Updated 2 years ago
- Fast offline auditing of Active Directory passwords using Python.☆163Updated 9 months ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated last month
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆204Updated 4 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆217Updated 4 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆191Updated 3 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated last week
- ☆163Updated last year
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆145Updated 4 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆439Updated 3 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆257Updated 2 years ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆154Updated 10 months ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Updated 2 years ago
- Office 365 and Exchange Enumeration☆186Updated 6 years ago
- A PowerShell module to deploy active directory decoy objects.☆229Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆320Updated 2 years ago
- Fake User Generator for Active Directory Environments☆158Updated 6 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆271Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated last year
- ☆169Updated 5 years ago
- zBang is a risk assessment tool that detects potential privileged account threats☆340Updated 2 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆233Updated 2 years ago
- ☆257Updated 2 years ago
- Disposable and resilient red team infrastructure with Terraform☆267Updated 6 years ago
- Material for the "Hands-On BloodHound" Workshop☆108Updated 4 years ago
- Parse .nessus file(s) and shows output in interactive UI☆152Updated last month
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆440Updated last year