Active Directory Vulnerability Scanner
☆419Mar 3, 2026Updated 2 months ago
Alternatives and similar repositories for ADPulse
Users that are interested in ADPulse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kerberos in rust for fun and profit☆73Mar 13, 2026Updated last month
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆198Mar 2, 2026Updated 2 months ago
- PolyEngine is an evasive PE packer designed for CTF challenges and low-level Windows security education. It focuses on bypassing EDR and …☆104Apr 29, 2026Updated last week
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆354Apr 28, 2026Updated last week
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Metasploit module for CVE-2025-24071 - Windows NTLM Hash Leak via .library-ms☆25Mar 18, 2025Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 3 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆300Updated this week
- A tiny tool built to help AD Admins tame the Protected Users group.☆142Mar 22, 2026Updated last month
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 9 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆324Mar 27, 2025Updated last year
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆334Feb 16, 2026Updated 2 months ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆57Nov 18, 2025Updated 5 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆915Apr 24, 2026Updated 2 weeks ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆636Feb 16, 2026Updated 2 months ago
- Bloodhound python Ingestor using ADWS☆38May 1, 2026Updated last week
- Automating the MITM attack on WSUS☆360Apr 3, 2026Updated last month
- Enumerate Domain Users Without Authentication☆285Apr 22, 2025Updated last year
- ☆28Mar 6, 2026Updated 2 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆128Jan 7, 2026Updated 4 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 8 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 4 months ago
- Pseudo-shell for RCE scenarios: tunnels commands via /tmp sockets to a local daemon, keeps context, no bind or reverse shell needed.☆45Jun 12, 2025Updated 10 months ago
- Enumerate active EDR's on the system☆154Sep 23, 2025Updated 7 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162Jan 3, 2026Updated 4 months ago
- Tool for MSSQL relay audit and abuse☆59Dec 17, 2024Updated last year
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆147Feb 16, 2026Updated 2 months ago
- ☆109Feb 21, 2023Updated 3 years ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆371Apr 8, 2026Updated last month
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆235Oct 8, 2024Updated last year
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated 2 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆131Dec 2, 2023Updated 2 years ago
- Display Exchange Server Health Status☆11Jan 5, 2023Updated 3 years ago
- The Azure Execution Tool☆155Feb 6, 2026Updated 3 months ago
- Active Directory Certificate Services (ADCS) enumeration library with BloodHound CE v6 export support☆77Apr 26, 2026Updated last week
- ☆19Sep 1, 2025Updated 8 months ago