Active Directory Group Policy analyzer
☆18Sep 20, 2019Updated 6 years ago
Alternatives and similar repositories for SysvolExplorer
Users that are interested in SysvolExplorer are comparing it to the libraries listed below
Sorting:
- Windows Internals Book 7th edition Tools☆17Apr 26, 2020Updated 5 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- This Repository is for random Knicks and knacks - in relation to PowerShell scripts I have created for one task or another.☆16Jan 13, 2025Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Disabling PowerShell v2 with Group Policy☆15Mar 11, 2022Updated 4 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- ☆54Nov 22, 2023Updated 2 years ago
- Windows Scripts☆12Apr 2, 2020Updated 5 years ago
- Application for administer multidomain Active Directory-based networks☆29Dec 4, 2025Updated 3 months ago
- Module for interact with ADMX and ADML files.☆21Oct 12, 2020Updated 5 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- My Awesome List☆12Updated this week
- ☆16May 20, 2022Updated 3 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- Platform independent library for interfacing windows security descriptors☆23Jan 2, 2026Updated 2 months ago
- Exchange PowerShell based script that checks every accepted domain of Exchange and will show the DNS configuration of SPF and DMARC for e…☆19Jul 9, 2025Updated 8 months ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 9 months ago
- ☆35Mar 19, 2022Updated 4 years ago
- Fast multithreaded multiplatform password spraying tool designed for easy use. Supports webhooks, jitter, delay, files, rotation, backend…☆41Sep 9, 2024Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- ☆29May 16, 2023Updated 2 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- C# Data Collector for the BloodHound Project, Version 3☆37Dec 28, 2021Updated 4 years ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Feb 22, 2023Updated 3 years ago
- ☆13Jan 15, 2019Updated 7 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- a tiny program to consume from ETW providers for research☆54Jan 4, 2025Updated last year