JonasBK / PowershellLinks
☆43Updated 8 months ago
Alternatives and similar repositories for Powershell
Users that are interested in Powershell are comparing it to the libraries listed below
Sorting:
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆40Updated 10 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆47Updated 6 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆86Updated last month
- Python3 rewrite of AsOutsider features of AADInternals☆55Updated 3 months ago
- SCEP request tool for AD CS and Intune☆69Updated this week
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 7 months ago
- ☆44Updated last year
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75Updated last year
- ☆83Updated last year
- time-based user enum via Basic Auth in Azure against Autodiscover☆33Updated last year
- Microsoft Graph API post-exploitation toolkit☆94Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆124Updated 2 months ago
- TokenCert☆100Updated 11 months ago
- ☆88Updated 3 years ago
- ☆51Updated 11 months ago
- Living off the land searches for explorer and sharepoint☆90Updated 6 months ago
- ☆40Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆42Updated 2 years ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 11 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated last year
- Lateral Movement☆124Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆60Updated 3 months ago
- ☆57Updated 8 months ago
- ☆60Updated last month
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 5 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated 2 years ago
- ☆36Updated 2 years ago
- ☆65Updated last year
- BloodHound PowerShell client☆67Updated 3 weeks ago