gtworek / SysvolExplorerLinks
Active Directory Group Policy analyzer
☆18Updated 6 years ago
Alternatives and similar repositories for SysvolExplorer
Users that are interested in SysvolExplorer are comparing it to the libraries listed below
Sorting:
- ☆23Updated 6 months ago
- blame Huy☆42Updated 4 years ago
- ☆35Updated 3 years ago
- ☆45Updated last year
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆16Updated last year
- A tool to create randomly insecure file shares that also contain unsecured credential files☆46Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Fun GUI for Group3rs output log☆37Updated 2 years ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆33Updated last year
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- ☆13Updated last year
- A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆27Updated 4 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆27Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- ☆23Updated 3 years ago
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- Tool to perform lateral movement between AAD joined devices☆64Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 3 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆87Updated 2 months ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- General Content☆26Updated last year
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆34Updated 4 months ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆39Updated 5 months ago
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Files to automatically deploy red team Active Directory test lab☆47Updated 3 years ago
- Scripts to enumerate and report on Entra Conditional Access☆39Updated 3 weeks ago
- Azure AiTM Function PoC to phish Entra ID Credentials☆23Updated 11 months ago
- Active Directory Firewall☆81Updated last month
- ☆25Updated 3 years ago