noraj / DCDetector
Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.
☆18Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for DCDetector
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Build a Windows VM on VMWare ESXi, vCenter or vSphere from scratch 100% automated with Ansible.☆12Updated 3 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- Use python to perform Kerberos pre-auth bruteforcing☆11Updated 2 years ago
- A Python script to find tenant id an region from a list of domain names.☆12Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 2 years ago
- ☆16Updated 4 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- Recon-ng modules for basic OSINT.☆10Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆20Updated 2 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 2 years ago
- Python support package to parse IP and host inputs from network based tooling☆11Updated last year
- Ease and assist the compromise of an Active Directory environment.☆27Updated 3 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 7 months ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 7 months ago
- ☆17Updated last year
- Ansible role that Installs Mythic☆14Updated 4 months ago