Active Directory

Explore 22 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Vulnetic AI Hacking Agent Logo

Vulnetic AI is the most capable autonomous hacking agent on the market.

0
ManageEngine ADManager Plus Logo

Manage, secure, and report on AD, Microsoft 365, and Google Workspace environments

0
ManageEngine ADAudit Plus Logo

Active Directory auditing and reporting solution that monitors AD changes

0
ManageEngine AD360 Logo

Integrated IAM suite for Active Directory and hybrid identity management

0
Singularity Identity Detection & Response Logo

Identity threat detection & response for Active Directory and Entra ID

0
Silverfort Identity Threat Detection & Response Logo

Detects & blocks identity-based threats in real-time across hybrid environments

0
Netwrix Identity Threat Detection & Response Logo

Identity threat detection & response platform for Active Directory security

0
Microsoft Defender for Identity Logo

Identity threat detection and response solution for Active Directory

0
Guardpot Honeypots Logo

Deception platform using honeypots to detect and analyze network threats

0
BloodHound Logo

BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.

4
CloudCopy Logo

CloudCopy implements a cloud version of the Shadow Copy attack to extract domain user hashes from AWS-hosted domain controllers by creating and mounting volume snapshots.

0
Azucar Logo

Azucar is a multi-threaded plugin-based tool that performs read-only security assessments of Azure Cloud environments, analyzing various assets and configurations without modifying deployed resources.

0
Admin Free Active Directory and Windows, Part 1 Logo

Learn about 'Admin Free' Active Directory and the significance of privileged groups in AD.

1
Hunt-Detect-Prevent Logo

Lists of sources and utilities to hunt, detect, and prevent evildoers.

0
Payloads All The Things Logo

A comprehensive repository of payloads and bypass techniques for web application security testing and penetration testing across multiple platforms and attack vectors.

0
Pass the Hash Guidance Logo

Project hosting scripts for implementing Pass the Hash mitigations with PtHTools module commands.

0
AD Build Script Logo

An automated script that configures Active Directory domains using customizable XML configuration files.

0
Active Directory Control Paths Logo

A tool for analyzing and visualizing control relationships and privilege escalation paths within Active Directory environments using graph-based representations.

0
libesedb Logo

A library for accessing and parsing Extensible Storage Engine (ESE) Database Files used by Microsoft applications like Windows Search, Exchange, and Active Directory for forensic analysis purposes.

0
PlumHound Logo

PlumHound is a reporting engine that converts BloodHoundAD's Neo4J queries into operational security reports for analyzing Active Directory vulnerabilities and attack paths.

0
GraphSpy Logo

GraphSpy is a browser-based post-exploitation tool for Azure Active Directory and Office 365 environments that enables token management, reconnaissance, and interaction with Microsoft 365 services.

0
Paving The Way to DA - Complete Post (Pt 1,2 & 3) Logo

A three-part educational series documenting techniques for achieving domain administrator privileges in Windows environments, covering attack methods, defenses, and remediation strategies.

0