A tool to create randomly insecure file shares that also contain unsecured credential files
☆49Feb 16, 2026Updated last month
Alternatives and similar repositories for BadShares
Users that are interested in BadShares are comparing it to the libraries listed below
Sorting:
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- This is a powershell module to help implement the AD Tier Model☆15Feb 17, 2026Updated last month
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆175May 13, 2024Updated last year
- ☆44Jul 5, 2024Updated last year
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- ☆18Jun 25, 2024Updated last year
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 7 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- ScriptSentry finds misconfigured and dangerous logon scripts.☆626Feb 16, 2026Updated last month
- Adjusted version of the impacket-dcomexec script to work against Windows 10☆17Oct 13, 2025Updated 5 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆158Feb 19, 2026Updated last month
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 7 months ago
- ☆50May 12, 2021Updated 4 years ago
- A small guide on Unknown/Orphaned SIDs and some PowerShell tools to help you get rid of them.☆20Mar 28, 2022Updated 3 years ago
- Shows which M365 Objects have Privileged Access and what type (i.e. PIM, Direct, Currently Elevated)☆38May 17, 2025Updated 10 months ago
- ☆53Oct 29, 2024Updated last year
- ☆18Feb 2, 2026Updated last month
- ☆218Mar 26, 2024Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- The ADSyncDump BOF is a port of Dirk-Jan Mollema's adconnectdump.py / ADSyncDecrypt into a Beacon Object File (BOF) with zero dependencie…☆174Sep 3, 2025Updated 6 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆207Aug 12, 2024Updated last year
- A small go tool to upload JSON files to the BloodHound community edition API☆31May 29, 2024Updated last year
- DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replicat…☆29Apr 26, 2023Updated 2 years ago
- ☆100Sep 1, 2024Updated last year
- ☆26Nov 8, 2024Updated last year
- ☆39Feb 26, 2025Updated last year
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆38Feb 24, 2026Updated 3 weeks ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆32Aug 16, 2023Updated 2 years ago
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.…☆31Feb 25, 2026Updated 3 weeks ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆140Sep 8, 2025Updated 6 months ago
- A simple tool to identify WDS servers in Active Directory☆32Aug 25, 2025Updated 6 months ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆76Nov 10, 2025Updated 4 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆211Sep 30, 2024Updated last year
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- A C# implementation of dumping credentials from Windows Credential Manager☆62Sep 23, 2023Updated 2 years ago
- Living off the land searches for explorer and sharepoint☆93Dec 7, 2025Updated 3 months ago
- Info on how to use Kerberos KDC on a non-domain joined host☆53Jul 31, 2024Updated last year