Jean-Francois-C / Windows-Penetration-Testing
Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that I find useful during internal penetration tests and assumed breach exercises (red teaming)
☆265Updated 3 months ago
Alternatives and similar repositories for Windows-Penetration-Testing:
Users that are interested in Windows-Penetration-Testing are comparing it to the libraries listed below
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆717Updated 3 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆543Updated 5 months ago
- Active Directory Auditing and Enumeration☆446Updated last week
- Materials for the workshop "Red Team Ops: Havoc 101"☆372Updated 6 months ago
- Ask a TGS on behalf of another user without password☆467Updated 2 weeks ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆708Updated last year
- Kerberoast with ACL abuse capabilities☆432Updated 4 months ago
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆518Updated 2 months ago
- Amsi Bypass payload that works on Windwos 11☆376Updated last year
- Useful C2 techniques and cheatsheets learned from engagements☆496Updated last week
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆299Updated last year
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆326Updated 5 months ago
- Python version of the C# tool for "Shadow Credentials" attacks☆706Updated last month
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆509Updated 3 weeks ago
- Just another Powerview alternative☆615Updated this week
- Tool to remotely dump secrets from the Windows registry☆457Updated last month
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆221Updated this week
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆579Updated 9 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆415Updated last month
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆459Updated 2 years ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆289Updated 3 weeks ago
- 🍊 Orange Tsai EventViewer RCE☆184Updated 2 years ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆269Updated 2 years ago
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆411Updated 2 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆747Updated 2 weeks ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆489Updated 2 years ago
- Partial python implementation of SharpGPOAbuse☆412Updated last year
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆307Updated 7 months ago
- ☆247Updated 3 years ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆560Updated 6 months ago