tothi / smbmapLinks
SMBMap is a handy SMB enumeration tool - here with Kerberos support
☆73Updated 4 years ago
Alternatives and similar repositories for smbmap
Users that are interested in smbmap are comparing it to the libraries listed below
Sorting:
- Bloodhound Portable for Windows☆53Updated 2 years ago
- blame Huy☆42Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Updated 5 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- ☆33Updated last year
- Azure AD enumeration over MS Graph☆82Updated 3 years ago
- Tool to extract powerful tokens from Office desktop apps memory☆73Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Resources for AD penetration testing and security☆33Updated 3 years ago
- ☆31Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Updated 2 months ago
- A port scanner written purely in PowerShell.☆83Updated 2 years ago
- ☆86Updated 3 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 3 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
- AutoPoC Generator HoneyPoC☆36Updated 2 months ago
- DEFCON 31 slide deck and video link☆66Updated 8 months ago
- ☆105Updated 3 years ago
- tool for identifying guest relationships between companies☆102Updated last year
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- Talk slides and material☆37Updated last year
- ☆42Updated 3 years ago
- ☆21Updated 4 months ago
- create a "simulated internet" cyber range environment☆19Updated last week