The Ultimate AppLocker Bypass List is a repository documenting common techniques to bypass AppLocker, including verified, unverified, and generic bypasses, as well as legacy methods to execute through DLLs. It also provides YML files for data reuse and a Powershell module called PowerAL for identifying weaknesses.
FEATURES
SIMILAR TOOLS
Okta Customer Identity Cloud is a CIAM solution that provides secure, customizable identity management for consumer and SaaS applications.
The Ping Identity Platform is an enterprise identity and access management solution that provides authentication, authorization, and identity governance capabilities with flexible deployment options for securing customer, workforce, and partner identities.
Tool for visualizing and analyzing control paths in Active Directory to determine access privileges and permissions.
A platform that discovers, manages and secures non-human identities like service accounts, API keys and secrets across enterprise environments.
A powerful tool that enables organizations to discover, manage, and secure privileged access, helping to reduce the risks associated with privileged accounts and activities.
CloudTracker helps identify over-privileged IAM users and roles by analyzing CloudTrail logs.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.