☆22Mar 4, 2025Updated 11 months ago
Alternatives and similar repositories for applywdac
Users that are interested in applywdac are comparing it to the libraries listed below
Sorting:
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- This script and accompanying files will allow system administrators to automatically deploy Microsoft Local Administrator Password Soluti…☆13Aug 18, 2017Updated 8 years ago
- ☆14Jun 2, 2025Updated 9 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆157Feb 19, 2026Updated last week
- Automated CIS Benchmark Compliance Audit for Debian 12 with Ansible & GOSS☆24Nov 17, 2025Updated 3 months ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- Security even with a small budget - there is no excuse!☆20May 24, 2023Updated 2 years ago
- ☆17Aug 24, 2020Updated 5 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Nov 3, 2021Updated 4 years ago
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆52Updated this week
- ☆43Apr 18, 2023Updated 2 years ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆258Nov 24, 2023Updated 2 years ago
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- A tiny tool built to find and fix common misconfigurations in Active Directory-integrated DNS☆148Dec 21, 2025Updated 2 months ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆18Feb 17, 2015Updated 11 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Mar 9, 2020Updated 5 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆63Feb 22, 2026Updated last week
- vCheck for Exchange☆20Jan 9, 2014Updated 12 years ago
- ☆27May 1, 2023Updated 2 years ago
- Default Detections for EDR☆97Feb 20, 2024Updated 2 years ago
- Collect chrome extensions from various devices and find out if they are malicious☆24Jan 17, 2026Updated last month
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆90Nov 23, 2022Updated 3 years ago
- ☆23Nov 13, 2021Updated 4 years ago
- Everything about Active Directory in a hybrid infrastructure!☆27Dec 31, 2022Updated 3 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- Get insights into the actual strength and quality of passwords in Active Directory.☆154Jul 11, 2024Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆134Jul 22, 2025Updated 7 months ago
- Serverless Local Administrator Password Solution☆27Aug 26, 2020Updated 5 years ago
- ☆24Mar 25, 2025Updated 11 months ago
- ☆25Feb 9, 2022Updated 4 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- ☆31May 16, 2024Updated last year
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- A repository to share publicly available Velociraptor detection content☆196Updated this week
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 6 years ago