michdu / WhatAmIMissingView external linksLinks
Get all AD objects which are hidden from you
☆18Aug 21, 2017Updated 8 years ago
Alternatives and similar repositories for WhatAmIMissing
Users that are interested in WhatAmIMissing are comparing it to the libraries listed below
Sorting:
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- This repository contains all the talk materials and ebook from the talk System Hardening Using Ansible given at All Day DevOps 2016 onlin…☆12Nov 16, 2016Updated 9 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- ☆13Oct 19, 2022Updated 3 years ago
- Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop…☆16Jan 11, 2017Updated 9 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- The documents☆56Nov 2, 2017Updated 8 years ago
- JEB Scripts☆21Nov 28, 2014Updated 11 years ago
- Here they are a pair of powershell scripts to keep track of certificate expiration and CRL expiration of your enterprise PKI. it uses cer…☆14Jul 13, 2022Updated 3 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆16Feb 10, 2015Updated 11 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- CVE-2017-5721 Proof-of-Concept☆17Oct 23, 2017Updated 8 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- ☆78May 24, 2018Updated 7 years ago
- Clone Git repository faster. Eliminates the repetitive typing of git clone and copy-pasting the url☆16Dec 17, 2017Updated 8 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆17Oct 29, 2014Updated 11 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- ☆113Jun 12, 2017Updated 8 years ago
- ☆85May 19, 2015Updated 10 years ago
- Vagrant instance to test Aptly and Jenkins Builds☆25Mar 19, 2016Updated 9 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Jun 6, 2024Updated last year
- Rogue Synergy server☆18Mar 8, 2017Updated 8 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Aug 20, 2020Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Test a network's egress controls with various levels of success and failure.☆104May 1, 2022Updated 3 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago