cyberark / zBangLinks
zBang is a risk assessment tool that detects potential privileged account threats
☆343Updated 3 years ago
Alternatives and similar repositories for zBang
Users that are interested in zBang are comparing it to the libraries listed below
Sorting:
- An Active Directory audit utility☆429Updated 2 years ago
- Powershell script to do domain auditing automation☆404Updated last month
- Detect and abuse risky SPNs☆266Updated 8 years ago
- Miscellaneous tools for BloodHound☆407Updated last year
- Find vulnerabilities in AD Group Policy☆641Updated 3 years ago
- NetSPI PowerShell Scripts☆342Updated last year
- A PowerShell module to deploy active directory decoy objects.☆240Updated 6 years ago
- A script for advanced discovery of Privileged Accounts - includes Shadow Admins☆823Updated 6 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆492Updated 6 years ago
- ☆265Updated 3 months ago
- Credential and Red Teaming Defense for Windows Environments☆330Updated last year
- Tool Analysis Result Sheet☆356Updated 8 years ago
- ☆264Updated 3 years ago
- ☆310Updated 7 years ago
- Active Directory forensic framework☆332Updated 3 years ago
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆481Updated last year
- ☆334Updated 3 years ago
- ☆399Updated last month
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆633Updated 3 months ago
- Audit Windows Security with best Practice☆192Updated last year
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆259Updated 3 years ago
- Deploy customizable Active Directory labs in Azure - automatically.☆429Updated last year
- Building an Active Directory domain and hacking it☆664Updated 6 years ago
- A curated list of awesome BloodhoundAD resources☆238Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆447Updated 3 years ago
- Digital forensic acquisition tool for Windows based incident response.☆346Updated last year
- The Old BloodHound C# Ingestor (Deprecated)☆512Updated 3 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆382Updated 6 years ago
- Some PowerShell Stuff☆280Updated 3 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆465Updated 8 years ago