Discover "HotSpots" - potential spots for credentials theft
☆24Apr 12, 2018Updated 8 years ago
Alternatives and similar repositories for PreCog
Users that are interested in PreCog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Find accounts using common and default passwords in Active Directory.☆71Sep 19, 2019Updated 6 years ago
- Automated metrics for @CyberArk DNA deep-dive analysis☆10Feb 8, 2022Updated 4 years ago
- PwnKit-Hunter is here to help you check if your systems are vulnerable to CVE-2021-4043, a.k.a. PwnKit☆27Feb 1, 2022Updated 4 years ago
- A Ruby interface to standard cryptographic primitives☆19Oct 31, 2023Updated 2 years ago
- zBang is a risk assessment tool that detects potential privileged account threats☆343Aug 3, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Ansible role to deploy Cyberark Password Vault Web Access☆20Mar 13, 2026Updated last month
- A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.☆171Feb 19, 2025Updated last year
- Ansible role to deploy Cyberark Central Policy Manager☆15Dec 5, 2024Updated last year
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- Solutions for automatically detecting, managing and securing privileged accounts in AWS EC2☆43Sep 7, 2023Updated 2 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- Automatically create safes and permission with role groups based on your enterprise standards and policies☆12Jul 31, 2018Updated 7 years ago
- Ansible role to deploy Cyberark Privileged Session Manager☆15Feb 19, 2025Updated last year
- CyberArk's Original Password Upload Utility (PUU) updated to use the REST API☆24Aug 28, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CyberArk Privileged Access Security automatic deployment using Ansible☆39Aug 1, 2023Updated 2 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- A PowerShell module with functions to help calculate working hours, and for generally working with or calculating business hours / date t…☆11Oct 5, 2022Updated 3 years ago
- A utility to check CyberArk component servers hardening status☆64Jun 1, 2022Updated 3 years ago
- Lambda handler for Yelp's ElastAlert☆14Feb 1, 2019Updated 7 years ago
- Ansible Galaxy Role to install and uninstall Cyberark AIM provider☆15Jan 17, 2023Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- PowerShell module to play with Kerberos S4U extensions☆23Sep 14, 2017Updated 8 years ago
- Start securing your secrets and infrastructure by installing Conjur OSS, using Docker and the official Conjur OSS containers on DockerHub…☆38Dec 16, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CyberArk Privileged Access Security on Cloud☆71Apr 13, 2026Updated 2 weeks ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- A tour of Conjur including LDAP sync, scalable machine identity, policy-based mgmt, ssh key mgmt and Splunk integration.☆21Apr 26, 2022Updated 4 years ago
- Detect and abuse risky SPNs☆267Jun 15, 2017Updated 8 years ago
- Extensions for Zeek's Intelligence Framework.☆11Mar 1, 2022Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Collection of AWS helper scripts.☆13Jan 15, 2018Updated 8 years ago
- Retrieve Credentials from CyberArk Central Credential Provider Web Service, or Local Credential Provider using CLIPasswordSDK☆51Sep 18, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆17Aug 4, 2020Updated 5 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- PowerShell Tools for CyberArk☆19Dec 13, 2019Updated 6 years ago
- G-Surge☆10Feb 7, 2018Updated 8 years ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 9 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 8 years ago