YossiSassi / AD-Replication-MetadataLinks
Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.g. during an Incident Response). Uses Replication metadata history parsing. Online and offline DB (backup)
☆16Updated 9 months ago
Alternatives and similar repositories for AD-Replication-Metadata
Users that are interested in AD-Replication-Metadata are comparing it to the libraries listed below
Sorting:
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- ☆23Updated 9 months ago
- General Content☆25Updated last month
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- blame Huy☆42Updated 4 years ago
- ☆23Updated 4 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- a tiny program to consume from ETW providers for research☆53Updated 11 months ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆36Updated 2 years ago
- ☆15Updated last year
- ☆22Updated 2 months ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- DEFCON 31 slide deck and video link☆66Updated 6 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- AutoPoC Generator HoneyPoC☆35Updated 2 weeks ago
- create a "simulated internet" cyber range environment☆19Updated 6 months ago
- ☆28Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆40Updated 4 months ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 3 years ago
- ☆45Updated 2 years ago
- WMI SA stuffs☆30Updated 3 years ago
- PowerShell PE Parser☆64Updated last year
- Living off the False Positive!☆41Updated 10 months ago
- Repository for LNK stuff☆31Updated 3 years ago
- Threat Mitigation Strategies☆26Updated 4 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆96Updated 3 years ago