cyberark / zBangLinks
zBang is a risk assessment tool that detects potential privileged account threats
☆342Updated 3 years ago
Alternatives and similar repositories for zBang
Users that are interested in zBang are comparing it to the libraries listed below
Sorting:
- Miscellaneous tools for BloodHound☆397Updated last year
- Detect and abuse risky SPNs☆262Updated 8 years ago
- Powershell script to do domain auditing automation☆396Updated 5 months ago
- An Active Directory audit utility☆422Updated last year
- Find vulnerabilities in AD Group Policy☆643Updated 3 years ago
- A script for advanced discovery of Privileged Accounts - includes Shadow Admins☆817Updated 6 years ago
- NetSPI PowerShell Scripts☆336Updated 7 months ago
- A PowerShell module to deploy active directory decoy objects.☆233Updated 5 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆493Updated 6 years ago
- ☆259Updated 9 months ago
- Credential and Red Teaming Defense for Windows Environments☆331Updated last year
- ☆257Updated 3 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆510Updated 3 years ago
- ☆395Updated 2 months ago
- Active Directory forensic framework☆325Updated 3 years ago
- Tool Analysis Result Sheet☆355Updated 7 years ago
- A curated list of awesome BloodhoundAD resources☆236Updated 2 years ago
- Audit Windows Security with best Practice☆186Updated 11 months ago
- Some PowerShell Stuff☆280Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆444Updated 2 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆456Updated 7 years ago
- ☆306Updated 6 years ago
- ☆333Updated 2 years ago
- Deploy customizable Active Directory labs in Azure - automatically.☆425Updated 9 months ago
- Building an Active Directory domain and hacking it☆662Updated 5 years ago
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆634Updated 3 years ago
- ☆526Updated 3 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆319Updated 5 years ago
- Dump Azure AD Connect credentials for Azure AD and Active Directory☆737Updated 2 weeks ago
- PoSh BloodHound Dog Whisperer☆192Updated 2 years ago