Showing 9 open source projects for "ad audit"

View related business solutions
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    Quint Code

    Quint Code

    Structured reasoning framework for Claude Code, Gemini, and Cursor

    ...It implements the First Principles Framework (FPF) to guide users and AI tools through hypothesis generation, logical verification, evidence gathering, and documented decision making, reducing reliance on ad hoc or “vibe” coding. Instead of accepting the first plausible answer generated by an AI assistant, Quint Code encourages generating multiple competing hypotheses, verifying them, and validating them against real evidence stored in a structured “knowledge base” within your project. It supports a cycle of abduction, deduction, and induction backed by CLI commands (like /q1-hypothesize, /q2-verify, /q3-validate, etc.) that create a persisting audit trail in a .quint/ directory.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    PrivescCheck

    PrivescCheck

    Privilege Escalation Enumeration Script for Windows

    PrivescCheck is a local privilege escalation reconnaissance tool for Unix-like systems that automates common checks auditors and system owners run when looking for misconfigurations. It enumerates kernel versions, installed packages, SUID/SGID binaries, world-writable files and directories, services, cron jobs, and user/group permissions to highlight likely escalation paths. The output is organized and human-readable so operators can triage findings quickly—flagging high-risk items...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Commando VM

    Commando VM

    Complete Mandiant Offensive VM (Commando VM)

    Commando VM (by Mandiant) is a Windows-based offensive security / red-team distribution built to turn a fresh Windows installation into a fully featured penetration testing environment. It provides an automated installer (PowerShell script) that uses Chocolatey, Boxstarter, and MyGet package feeds to download, install, and configure dozens (100+ / 170+ depending on version) of offensive, fuzzing, enumeration, and exploitation tools. The idea is to spare testers the repetitive work of...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 4
    Timesketch

    Timesketch

    Collaborative forensic timeline analysis

    ...The system supports tagging, sketch notes, and story building so teams can annotate findings and share context without losing the raw data trail. Integrations with popular DFIR pipelines make ingestion repeatable, while role-based access and audit logs support enterprise workflows. By combining scale, collaboration, and reproducibility, Timesketch moves incident response beyond ad-hoc spreadsheets to a durable, team-oriented investigation record.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 5
    MetricFlow

    MetricFlow

    MetricFlow allows you to define, build, and maintain metrics in code

    ...It works alongside a data stack—typically built with dbt—and allows you to express metrics as YAML‐based definitions tied to semantic models and dimension tables, rather than embedding logic ad-hoc across many dashboards or scripts. When a user or tool requests a metric (e.g., “monthly revenue by region”), MetricFlow generates optimized, warehouse-specific SQL to compute that metric, handling joins, filters, time grains, offsets, and other complexities under the hood. Because metric definitions live centrally, you avoid duplication across teams and tools, reduce risk of inconsistent numbers, and make it easier to audit and evolve the logic over time. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    BloodHound Legacy

    BloodHound Legacy

    Six Degrees of Domain Admin

    BloodHound Legacy is the deprecated open‑source version of the BloodHound Active Directory attack path analysis tool. It uses graph theory to model and visualize privileged relationships in AD, Entra ID, and Azure environments. Security professionals use it to enumerate domain privilege escalation paths, misconfigurations, and attack surfaces in corporate networks
    Downloads: 14 This Week
    Last Update:
    See Project
  • 7
    opennac

    opennac

    OpenSource Enterprise nac

    openNAC is an opensource Network Access Control for corporate LAN / WAN environments. It enables authentication, authorization and audit policy-based all access to network. It supports diferent network vendors like Cisco, Alcatel, 3Com or Extreme Networks, and different clients like PCs with Windows or Linux, Mac,devices like smartphones and tablets. Based on open source components and self-development It is based on industry standards such as FreeRadius, 802.1x, AD, ldap, ...It is very extensible, new features can be incorporated because it is architectured in plugins. ...
    Downloads: 23 This Week
    Last Update:
    See Project
  • 8
    This software helps systems administrators in a Windows environment to keep track of Active Directory. It will ensure that membership in groups are not given to the wrong members.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Domain Auditor was written to simplify the task of tracking pooled accounts within an AD domain. The driver behind the tool is compliance with Sarbanes-Oxley (SOX) requirements. Domain Auditor simplifies generting reports to satisfy audit requirements.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB