JonasBK / PowershellLinks
☆42Updated 7 months ago
Alternatives and similar repositories for Powershell
Users that are interested in Powershell are comparing it to the libraries listed below
Sorting:
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆84Updated last month
- ☆83Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆40Updated 10 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆55Updated 2 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆125Updated last month
- TokenCert☆100Updated 10 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆70Updated this week
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 10 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆47Updated 5 months ago
- ☆57Updated 7 months ago
- Microsoft Graph API post-exploitation toolkit☆94Updated last year
- ☆44Updated last year
- CLI tool to interact with the BloodHound CE API☆53Updated last week
- ☆37Updated 11 months ago
- SCEP request tool for AD CS and Intune☆70Updated 2 months ago
- ☆58Updated 3 weeks ago
- ☆89Updated 3 years ago
- ☆135Updated 7 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆93Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Updated 2 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆59Updated 2 months ago
- ☆119Updated 6 months ago
- Decrypt Veeam database passwords☆162Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 4 months ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆33Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 6 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆144Updated 6 months ago
- ☆73Updated 3 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆53Updated last week
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆75Updated 2 years ago