diff --git a/README.md b/README.md index d7a0d29..ac80cb9 100644 --- a/README.md +++ b/README.md @@ -418,6 +418,7 @@ See also [awesome-windows#security](https://github.com/Awesome-Windows/Awesome#s - [HardenTools](https://github.com/securitywithoutborders/hardentools) - Utility that disables a number of risky Windows features. - [NotRuler](https://github.com/sensepost/notruler) - Detect both client-side rules and VBScript enabled forms used by the [Ruler](https://github.com/sensepost/ruler) attack tool when attempting to compromise a Microsoft Exchange server. +- [PingCastle](https://www.pingcastle.com/) - Active Directory vulnerability detection and reporting tool. - [PlumHound](https://github.com/PlumHound/PlumHound) - More effectively use BloodHoundAD in continual security life-cycles by utilizing its pathfinding engine to identify Active Directory security vulnerabilities. - [Sandboxie](https://www.sandboxie.com/) - Free and open source general purpose Windows application sandboxing utility. - [Sigcheck](https://docs.microsoft.com/en-us/sysinternals/downloads/sigcheck) - Audit a Windows host's root certificate store against Microsoft's [Certificate Trust List (CTL)](https://docs.microsoft.com/en-us/windows/desktop/SecCrypto/certificate-trust-list-overview).