Active Directory health audit.
Find the right cybersecurity tool in seconds.
Search by what you want to do, what you want to do it on, and why.
cyberstars.action(do anything).target(anything).purpose(any purpose)344resultsOffline WPS pin brute-force.
Super-timelining for forensics.
BloodHound reporting for defenders.
Live PowerShell disk forensics.
PowerShell post-exploitation framework.
MitM relay sidekick for AD.
Linux port of Sysinternals Procmon.
Multi-cloud security posture.
PowerShell AD post-exploitation.
QARK
—Quick Android Review Kit.
JavaScript deobfuscator.
WPS pin brute-force attack.
Full-featured reconnaissance framework.
Endgame's ATT&CK simulation framework.
C2 redirector with traffic control.
LLMNR, NBT-NS and MDNS poisoner.
Detect vulnerable JS libraries.
RSA recovery for CTF challenges.
C# Kerberos abuse toolkit.
Abuse Exchange services from the outside.
Modern port scanner in Rust.
Find misconfigured object storage buckets.
Asynchronous C2 powered by DLR runtimes.