Active Directory Vulnerability Scanner
☆372Mar 3, 2026Updated 3 weeks ago
Alternatives and similar repositories for ADPulse
Users that are interested in ADPulse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kerberos in rust for fun and profit☆67Mar 13, 2026Updated 2 weeks ago
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆179Mar 2, 2026Updated 3 weeks ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆350Mar 19, 2026Updated last week
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 8 months ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆140Mar 22, 2026Updated last week
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆321Mar 27, 2025Updated last year
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- ☆57Nov 18, 2025Updated 4 months ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆625Feb 16, 2026Updated last month
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆317Feb 16, 2026Updated last month
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆901Mar 11, 2026Updated 2 weeks ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆281Updated this week
- Python tool to automatically perform SPN-less RBCD attacks.☆126Jan 7, 2026Updated 2 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 7 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆159Jan 3, 2026Updated 2 months ago
- Pseudo-shell for RCE scenarios: tunnels commands via /tmp sockets to a local daemon, keeps context, no bind or reverse shell needed.☆45Jun 12, 2025Updated 9 months ago
- PowerShell implementation for AD CS☆116Mar 2, 2026Updated 3 weeks ago
- Tool for MSSQL relay audit and abuse☆59Dec 17, 2024Updated last year
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆360Jan 8, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 9 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆46Feb 24, 2026Updated last month
- The Azure Execution Tool☆140Feb 6, 2026Updated last month
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- ☆19Sep 1, 2025Updated 6 months ago
- Display Exchange Server Health Status☆11Jan 5, 2023Updated 3 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆123Jan 15, 2025Updated last year
- Conditional Access Reporting☆29Apr 4, 2025Updated 11 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆108Jan 26, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Check for LDAP protections regarding the relay of NTLM authentication☆530Nov 19, 2024Updated last year
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Oct 22, 2025Updated 5 months ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated 2 months ago
- Automating the MITM attack on WSUS☆315Mar 22, 2026Updated last week
- All my PowerShell scripts☆12Jan 7, 2023Updated 3 years ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago