Skip to content
View nbandodk's full-sized avatar

Block or report nbandodk

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

CLI tool to interact with the BloodHound CE API

Python 65 7 Updated Dec 16, 2025

Crawl and analyze JavaScript for secrets, tokens, and API endpoints. A powerful bug bounty tool for automated JS analysis.

Python 14 3 Updated Dec 4, 2025

Repo for ADACLScan.ps1 - Your number one script for ACL's in Active Directory

PowerShell 1,120 184 Updated Dec 16, 2025

A powerful reconnaissance toolkit for authorized Azure penetration testing and data enumeration.

Java 110 50 Updated Aug 20, 2025

KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).

Python 264 35 Updated Dec 15, 2025

PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accounts have permissions to make changes within their OU(s) or m…

C# 29 1 Updated Apr 10, 2024

Awesome EDR Bypass Resources For Ethical Hacking

1,417 140 Updated Oct 16, 2025

Group Policy Eater is a PowerShell module that aims to gather information about Group Policies but also allows fixing issues that you may find in them.

PowerShell 1,119 113 Updated Dec 5, 2025

Cloud-native SIEM for intelligent security analytics for your entire enterprise.

Python 5,397 3,462 Updated Dec 22, 2025

Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries

Python 51 5 Updated Jan 11, 2023

Threat Hunting with Elastic Stack, Published by Packt

PowerShell 39 15 Updated Jan 18, 2023

A collection of resources for Threat Hunters

Python 912 169 Updated Oct 15, 2024

Detect Tactics, Techniques & Combat Threats

SCSS 2,249 346 Updated Oct 29, 2025

Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues invo…

Python 1,023 174 Updated Jun 16, 2025

DHCP Fingerprinting

Python 31 14 Updated Dec 15, 2020

317 efficient solutions to HackerRank problems

Java 2,741 1,445 Updated Jun 18, 2024