☆91Aug 5, 2023Updated 2 years ago
Alternatives and similar repositories for AD_Enumeration_Hunt
Users that are interested in AD_Enumeration_Hunt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- ☆10Mar 27, 2022Updated 4 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆267Dec 15, 2025Updated 4 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆107Dec 8, 2025Updated 5 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Dec 26, 2023Updated 2 years ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆111Sep 7, 2023Updated 2 years ago
- ☆109Feb 21, 2023Updated 3 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆594Jan 20, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- DNSWatch - DNS Traffic Sniffer and Analyzer☆216Feb 15, 2025Updated last year
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆188Feb 27, 2024Updated 2 years ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- ☆165Oct 25, 2023Updated 2 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 5 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆177Nov 7, 2022Updated 3 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆162Feb 22, 2024Updated 2 years ago
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆114Sep 17, 2025Updated 7 months ago
- Tool for enumerating Active Directory environments☆48Aug 10, 2023Updated 2 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- ☆438Mar 2, 2025Updated last year
- ☆38Apr 7, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Offensive Security recon tool☆91Aug 27, 2021Updated 4 years ago
- MultiPlatform HTTP Reverse Shell☆243Dec 31, 2025Updated 4 months ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- LDAP enumeration tool implemented in Python3☆225May 20, 2025Updated 11 months ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆45Oct 26, 2025Updated 6 months ago
- Ask a TGS on behalf of another user without password☆483Mar 30, 2025Updated last year
- Some of my rough notes for Docker threat detection☆51Aug 26, 2023Updated 2 years ago