Active Directory Vulnerability Scanner
☆380Mar 3, 2026Updated last month
Alternatives and similar repositories for ADPulse
Users that are interested in ADPulse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kerberos in rust for fun and profit☆70Mar 13, 2026Updated last month
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆190Mar 2, 2026Updated last month
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆352Mar 19, 2026Updated 3 weeks ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 2 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆287Apr 8, 2026Updated last week
- Local SYSTEM auth trigger for relaying☆171Jul 22, 2025Updated 8 months ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆140Mar 22, 2026Updated 3 weeks ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆323Mar 27, 2025Updated last year
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆324Feb 16, 2026Updated 2 months ago
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- ☆57Nov 18, 2025Updated 5 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆907Apr 9, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ScriptSentry finds misconfigured and dangerous logon scripts.☆627Feb 16, 2026Updated 2 months ago
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 11 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆128Jan 7, 2026Updated 3 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 8 months ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 3 months ago
- Enumerate active EDR's on the system☆151Sep 23, 2025Updated 6 months ago
- Pseudo-shell for RCE scenarios: tunnels commands via /tmp sockets to a local daemon, keeps context, no bind or reverse shell needed.☆45Jun 12, 2025Updated 10 months ago
- ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets …☆162Jan 3, 2026Updated 3 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆147Feb 16, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tool for MSSQL relay audit and abuse☆59Dec 17, 2024Updated last year
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆364Apr 8, 2026Updated last week
- ☆109Feb 21, 2023Updated 3 years ago
- Python alternative to Mimikatz lsadump::dcshadow☆161Jun 24, 2025Updated 9 months ago
- ☆235Oct 8, 2024Updated last year
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated last month
- PowerShell implementation for AD CS☆120Mar 2, 2026Updated last month
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- A practical client for ADWS in Golang.☆50Mar 3, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Display Exchange Server Health Status☆11Jan 5, 2023Updated 3 years ago
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆557Jan 8, 2026Updated 3 months ago
- The Azure Execution Tool☆154Feb 6, 2026Updated 2 months ago
- ☆19Sep 1, 2025Updated 7 months ago
- Conditional Access Reporting☆29Apr 4, 2025Updated last year
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆111Jan 26, 2026Updated 2 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆123Jan 15, 2025Updated last year