noraj / ADAssaultLinks
Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.
☆14Updated this week
Alternatives and similar repositories for ADAssault
Users that are interested in ADAssault are comparing it to the libraries listed below
Sorting:
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- Enumeration & fingerprint tool☆24Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- ☆14Updated 2 months ago
- A Python script to find tenant id an region from a list of domain names.☆14Updated 4 months ago
- ☆28Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆10Updated 9 months ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆18Updated last month
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- Passworld is a fully customizable wordlist generator☆15Updated 8 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 3 years ago
- Simple username generator based on a list of name and surname☆12Updated 4 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆35Updated last week
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- ☆12Updated 3 years ago
- Tool for scanning domains for .git directories.☆16Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 3 weeks ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated 3 weeks ago
- Smart and efficient tool to automate open redirect detection at scale.☆8Updated 3 years ago