Powershell script to do domain auditing automation
☆407Feb 17, 2026Updated last month
Alternatives and similar repositories for adaudit
Users that are interested in adaudit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active Directory Audit Tools for IT Audits☆84Jun 9, 2025Updated 10 months ago
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆1,897Jun 15, 2020Updated 5 years ago
- Find vulnerabilities in AD Group Policy☆640Mar 25, 2022Updated 4 years ago
- An Active Directory audit utility☆427Feb 2, 2024Updated 2 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Jun 1, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automation for internal Windows Penetrationtest / AD-Security☆3,653Aug 28, 2025Updated 7 months ago
- A script for advanced discovery of Privileged Accounts - includes Shadow Admins☆829Sep 9, 2019Updated 6 years ago
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆637Oct 18, 2025Updated 5 months ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆442Apr 1, 2022Updated 4 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆736Feb 5, 2019Updated 7 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 8 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,129Dec 7, 2022Updated 3 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,617Jul 10, 2023Updated 2 years ago
- Active Directory permissions (ACL/ACE) auditing tools☆148Jun 15, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Powershell-based Windows Security Auditing Toolbox☆574Jan 9, 2019Updated 7 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆331Oct 20, 2019Updated 6 years ago
- PowerShell Pass The Hash Utils☆1,744Dec 9, 2018Updated 7 years ago
- ☆1,677Apr 14, 2025Updated 11 months ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,937Nov 19, 2025Updated 4 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆317Dec 19, 2023Updated 2 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,651Oct 11, 2018Updated 7 years ago
- Domain Password Audit Tool for Pentesters☆1,028Dec 24, 2025Updated 3 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- gather gather gather☆584Mar 15, 2025Updated last year
- PowerShell rebuilt in C# for Red Teaming purposes☆1,054Feb 27, 2026Updated last month
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,821Mar 11, 2026Updated last month
- Miscellaneous Tools☆270Oct 29, 2020Updated 5 years ago
- Test and auditing Powershell and Pester scripts for Active Directory☆71Feb 25, 2020Updated 6 years ago
- NTLMv1 Multitool☆661Mar 12, 2026Updated last month
- PowerShell Remote Download Cradle Generator & Obfuscator☆851Mar 23, 2018Updated 8 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- A tool to elevate privilege with Windows Tokens☆1,065Oct 6, 2023Updated 2 years ago
- Timeline of Active Directory changes with replication metadata☆521Mar 21, 2025Updated last year
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,316Aug 19, 2019Updated 6 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,821Mar 17, 2021Updated 5 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago