zBang is a risk assessment tool that detects potential privileged account threats
☆343Aug 3, 2022Updated 3 years ago
Alternatives and similar repositories for zBang
Users that are interested in zBang are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A script for advanced discovery of Privileged Accounts - includes Shadow Admins☆829Sep 9, 2019Updated 6 years ago
- Find accounts using common and default passwords in Active Directory.☆70Sep 19, 2019Updated 6 years ago
- Discover "HotSpots" - potential spots for credentials theft☆24Apr 12, 2018Updated 8 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- psPAS Example scripts & code☆11Jul 19, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Detect and abuse risky SPNs☆267Jun 15, 2017Updated 8 years ago
- Find vulnerabilities in AD Group Policy☆641Mar 25, 2022Updated 4 years ago
- CyberArk Privileged Access Security automatic deployment using Ansible☆39Aug 1, 2023Updated 2 years ago
- SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS☆910Dec 17, 2024Updated last year
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆1,911Jun 15, 2020Updated 5 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,128Dec 7, 2022Updated 3 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆814Aug 28, 2022Updated 3 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- gather gather gather☆586Mar 15, 2025Updated last year
- Active Directory ACL exploitation with BloodHound☆762Nov 18, 2021Updated 4 years ago
- Bloodhound Reporting for Blue and Purple Teams☆1,292Nov 15, 2025Updated 5 months ago
- An Insider Threat Toolkit☆156Dec 17, 2018Updated 7 years ago
- ☆184Feb 21, 2022Updated 4 years ago
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,844Apr 30, 2026Updated last week
- PowerShell MachineAccountQuota and DNS exploit tools☆1,461Jan 11, 2023Updated 3 years ago
- Active Directory Control Paths auditing and graphing tools☆679Dec 17, 2020Updated 5 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,821Jul 29, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,171Apr 22, 2026Updated 2 weeks ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆493Feb 16, 2019Updated 7 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,636Apr 28, 2026Updated last week
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆288Aug 7, 2020Updated 5 years ago
- Automated metrics for @CyberArk DNA deep-dive analysis☆10Feb 8, 2022Updated 4 years ago
- ☆527Sep 15, 2022Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,663Aug 28, 2025Updated 8 months ago
- Building an Active Directory domain and hacking it☆667Dec 23, 2019Updated 6 years ago
- A little toolbox to play with Microsoft Kerberos in C☆1,517Dec 14, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A tool to abuse Exchange services☆2,303Jun 10, 2024Updated last year
- A utility to check CyberArk component servers hardening status☆65Jun 1, 2022Updated 3 years ago
- C# implementation of harmj0y's PowerView☆1,094Mar 22, 2024Updated 2 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆448Oct 19, 2022Updated 3 years ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,117May 29, 2024Updated last year
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆637Oct 18, 2025Updated 6 months ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago