A tool to identify and remediate common misconfigurations in Active Directory Certificate Services
☆18Jan 13, 2024Updated 2 years ago
Alternatives and similar repositories for Locksmith
Users that are interested in Locksmith are comparing it to the libraries listed below
Sorting:
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆316Feb 16, 2026Updated last month
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- ScriptSentry finds misconfigured and dangerous logon scripts.☆626Feb 16, 2026Updated last month
- Community repository for access control DSC resources☆33Aug 31, 2015Updated 10 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Jun 12, 2024Updated last year
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated last year
- PowerShell module to manage domain controllers & initial domain deployments☆13Oct 31, 2025Updated 4 months ago
- Daily C2 threat intelligence feed☆19Updated this week
- Manage process privileges and adjust Windows rights/privileges in PowerShell☆46Nov 26, 2021Updated 4 years ago
- Logged PS Remote Command Wrapper for Blue Team Forensics/IR☆11Apr 12, 2018Updated 7 years ago
- Ironman Software PowerShell samples.☆23Dec 29, 2020Updated 5 years ago
- demo material for my PowerShell Scripting Secrets presentation☆15Nov 20, 2017Updated 8 years ago
- Powershell Music framework☆23Dec 11, 2019Updated 6 years ago
- Provides a way to configure user rights assignments in local security policies using PowerShell without using secedit.exe.☆22Feb 14, 2026Updated last month
- ☆39May 4, 2022Updated 3 years ago
- A walkthrough of deploying and configuring a PowerShell Private Gallery to Azure via ARM Templates, DSC Configurations, and Visual Studio…☆12Mar 8, 2017Updated 9 years ago
- Cross platform PowerShell implementation of Authenticode signing and verification☆41Sep 30, 2025Updated 5 months ago
- ☆25Mar 11, 2026Updated last week
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆27Dec 1, 2022Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Visual Studio Code extension for PowerShell Universal☆15Sep 26, 2025Updated 5 months ago
- PowerShell Runspace Connect-Back Shell☆26Dec 31, 2015Updated 10 years ago
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆51Jan 16, 2026Updated 2 months ago
- LINQ-Style PowerShell Methods☆26Nov 4, 2021Updated 4 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆30Jun 26, 2023Updated 2 years ago
- ☆41May 22, 2024Updated last year
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆59Nov 24, 2025Updated 3 months ago
- PowerShell Over WMI☆16Apr 23, 2019Updated 6 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- Presentations from various talks that I have given☆19May 19, 2017Updated 8 years ago
- ESXi Cyber Security Incident Response Script☆25Sep 4, 2024Updated last year
- A tool to create randomly insecure file shares that also contain unsecured credential files☆49Feb 16, 2026Updated last month
- A test project to try the new win32k.sys system call filtering mitigation in Windows 10☆15Mar 17, 2019Updated 7 years ago
- Interactive pipeline filtering in PowerShell (a port of peco).☆22Jul 9, 2019Updated 6 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- A text-based adventure game that pays homage to the games of yester-year, with some personal twists.☆23Jan 18, 2026Updated 2 months ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Jun 10, 2025Updated 9 months ago