Top-rated tools trusted by the cybersecurity community
A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active Directory
A recursive internet scanner for hackers.
Scan for misconfigured S3 buckets across S3-compatible APIs!
AD Explorer is an advanced Active Directory (AD) viewer and editor.
Find tools organized by testing methodology and use case
Videos, podcasts, and articles about penetration testing