cyberark / zBangLinks
zBang is a risk assessment tool that detects potential privileged account threats
☆343Updated 3 years ago
Alternatives and similar repositories for zBang
Users that are interested in zBang are comparing it to the libraries listed below
Sorting:
- Miscellaneous tools for BloodHound☆399Updated last year
- An Active Directory audit utility☆423Updated last year
- Powershell script to do domain auditing automation☆394Updated 5 months ago
- Detect and abuse risky SPNs☆264Updated 8 years ago
- A script for advanced discovery of Privileged Accounts - includes Shadow Admins☆817Updated 6 years ago
- A PowerShell module to deploy active directory decoy objects.☆234Updated 5 years ago
- NetSPI PowerShell Scripts☆336Updated 8 months ago
- Find vulnerabilities in AD Group Policy☆642Updated 3 years ago
- ☆260Updated 10 months ago
- Credential and Red Teaming Defense for Windows Environments☆331Updated last year
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆493Updated 6 years ago
- ☆258Updated 3 years ago
- Active Directory forensic framework☆323Updated 3 years ago
- Audit Windows Security with best Practice☆185Updated last year
- ☆394Updated 3 weeks ago
- Tool Analysis Result Sheet☆356Updated 7 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆444Updated 2 years ago
- ☆333Updated 2 years ago
- ☆181Updated last month
- Deploy customizable Active Directory labs in Azure - automatically.☆426Updated 10 months ago
- Bloodhound Attack Path Automation in CobaltStrike☆319Updated 5 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆205Updated 4 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆510Updated 3 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 3 years ago
- A curated list of awesome BloodhoundAD resources☆236Updated 2 years ago
- Building an Active Directory domain and hacking it☆663Updated 5 years ago
- ☆307Updated 6 years ago
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆740Updated last month
- Digital forensic acquisition tool for Windows based incident response.☆344Updated last year
- Disposable and resilient red team infrastructure with Terraform☆277Updated 6 years ago