Active Directory health audit.
Trouvez le bon outil de cybersécurité en quelques secondes.
Cherchez par ce que vous voulez faire, sur quoi, et pourquoi.
cyberstars.action(agir).target(sur n'importe quoi).purpose(tout contexte)344resultsOffline WPS pin brute-force.
Super-timelining for forensics.
BloodHound reporting for defenders.
Live PowerShell disk forensics.
PowerShell post-exploitation framework.
MitM relay sidekick for AD.
Linux port of Sysinternals Procmon.
Multi-cloud security posture.
PowerShell AD post-exploitation.
QARK
—Quick Android Review Kit.
JavaScript deobfuscator.
WPS pin brute-force attack.
Full-featured reconnaissance framework.
Endgame's ATT&CK simulation framework.
C2 redirector with traffic control.
LLMNR, NBT-NS and MDNS poisoner.
Detect vulnerable JS libraries.
RSA recovery for CTF challenges.
C# Kerberos abuse toolkit.
Abuse Exchange services from the outside.
Modern port scanner in Rust.
Find misconfigured object storage buckets.
Asynchronous C2 powered by DLR runtimes.