From 1796f969e62d6a40bc9edf154f50e864010c832b Mon Sep 17 00:00:00 2001 From: fabacab Date: Sun, 6 Dec 2020 15:44:56 -0500 Subject: [PATCH] Add PlumHound. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 91726b7..cf9d0c9 100644 --- a/README.md +++ b/README.md @@ -336,6 +336,7 @@ See also [awesome-windows#security](https://github.com/Awesome-Windows/Awesome#s - [HardenTools](https://github.com/securitywithoutborders/hardentools) - Utility that disables a number of risky Windows features. - [NotRuler](https://github.com/sensepost/notruler) - Detect both client-side rules and VBScript enabled forms used by the [Ruler](https://github.com/sensepost/ruler) attack tool when attempting to compromise a Microsoft Exchange server. +- [PlumHound](https://plumhound.defensiveorigins.com/) - More effectively use BloodHoundAD in continual security life-cycles by utilizing its pathfinding engine to identify Active Directory security vulnerabilities. - [Sandboxie](https://www.sandboxie.com/) - Free and open source general purpose Windows application sandboxing utility. - [Sigcheck](https://docs.microsoft.com/en-us/sysinternals/downloads/sigcheck) - Audit a Windows host's root certificate store against Microsoft's [Certificate Trust List (CTL)](https://docs.microsoft.com/en-us/windows/desktop/SecCrypto/certificate-trust-list-overview). - [Sticky Keys Slayer](https://github.com/linuz/Sticky-Keys-Slayer) - Establishes a Windows RDP session from a list of hostnames and scans for accessibility tools backdoors, alerting if one is discovered.