Tools and information regarding Windows Kerberos cryptography
☆50Apr 9, 2026Updated 3 weeks ago
Alternatives and similar repositories for Kerberos-Crypto
Users that are interested in Kerberos-Crypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Een leuk framework voor Conditional Access. In mijn Blogs kan je mijn beredenering volgen en een stukje instructie.🥰☆12Nov 14, 2024Updated last year
- Administrative Template (ADMX) for Microsoft Defender Attack Surface Reduction (ASR)☆15Jul 7, 2025Updated 9 months ago
- Automate Reporting of Defender for Cloud recommendations & Role Assignments with 35 different views☆12Jan 31, 2023Updated 3 years ago
- Maintain Tier 0 users. This script take care all Tier 0 users are in the correct OU or in the default user container and add the Kerberos…☆65Apr 1, 2025Updated last year
- ☆11Mar 29, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Generate single-file static responsive HTML page from Markdown with syntax-highlighting.☆16Apr 16, 2026Updated 2 weeks ago
- ☆44Updated this week
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- Implement a powerful Tiering Security Model in Microsoft Entra for your Cloud Administrator identities using Azure Automation.☆55Mar 11, 2026Updated last month
- Intellexia is a simple python application to run Long Language Models inference on the NPU for Intel Core Ultra processors as Meteor Lake…☆25Jul 7, 2025Updated 9 months ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- This DNS service listens to the client requests and uses Host's resolver to return responses. Used in conjunction with the NAT virtual sw…☆18Sep 3, 2016Updated 9 years ago
- A simple OCSP responder built with ASP.NET Core.☆14Mar 25, 2026Updated last month
- PowerShell scripts and automation tools for Microsoft technologies such as Windows, Active Directory, Intune, Azure, and Office 365 — des…☆53Mar 2, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆45Feb 12, 2026Updated 2 months ago
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆39May 17, 2025Updated 11 months ago
- Active Directory Tiered Administration Model☆19Aug 2, 2025Updated 9 months ago
- ☆13May 30, 2025Updated 11 months ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆21Mar 20, 2026Updated last month
- ☆18Apr 23, 2026Updated last week
- Lab content for the ExpertsLive Denmark 2026 Identity Masterclass☆105Feb 26, 2026Updated 2 months ago
- Restoring some of my older tools to the web☆12Oct 18, 2024Updated last year
- Powershell scripts to implement a Tier administration model in Active Directory☆31Sep 22, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- governance and validation for configuration baselines in M365 – made as easy as possible☆35Feb 6, 2026Updated 2 months ago
- AppLocker baseline configuration with the AaronLocker module. Used for testing with Windows 10, Intune etc.☆21Nov 21, 2025Updated 5 months ago
- Less Privileged AppContainer (LPAC) Sandbox for Firefox☆17May 28, 2025Updated 11 months ago
- XDebug Trace panel for Nette 2.0 framework☆14Nov 3, 2014Updated 11 years ago
- PowerShell module to manage the Entra ID device-bound passkey feature☆33Jun 5, 2024Updated last year
- Scans NTFS permissions and ensures that BUILTIN\Administrators and NT AUTHORITY\SYSTEM have full control to every file and folder☆45Feb 8, 2025Updated last year
- This is a tool to troubleshoot usage of Proxy Auto Configuration (PAC) or Web Proxy Autodiscovery Protocol (WPAD) files.☆49Jun 28, 2024Updated last year
- Automating Employee Onboarding with Power Automate☆14Jul 20, 2025Updated 9 months ago
- [x]it! support for working with todo and check list files in Sublime Text☆18Oct 19, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Demos related to the TURRIS:GADGETS project of Jablotron and CZ.NIC☆11Jul 16, 2015Updated 10 years ago
- Hörmann BiSecur Gateway command line interface, Home Assistant integration and GoLang SDK☆10Updated this week
- Tier 1 Just-In-Time☆13Apr 21, 2026Updated last week
- AstroCrypt is a powerful and versatile tool designed to assist you in both cracking hashed passwords and identifying the hash type used t…☆18Oct 26, 2023Updated 2 years ago
- ☆92Updated this week
- A console debugger using DbgX and Terminal.Gui☆30Oct 12, 2022Updated 3 years ago
- Additional Resources to improve Customer Experience with Azure Advanced Threat Protection☆22Jun 12, 2023Updated 2 years ago