LuemmelSec / WinPwn
Automation for internal Windows Penetrationtest / AD-Security
☆18Updated last year
Alternatives and similar repositories for WinPwn:
Users that are interested in WinPwn are comparing it to the libraries listed below
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- blame Huy☆42Updated 4 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Python Script for SAML2 Authentication Passwordspray☆38Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Updated last year
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆25Updated last year
- ☆34Updated this week
- Continuous kerberoast monitor☆44Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- User enumeration and password spraying tool for testing Azure AD☆69Updated 2 years ago
- ☆31Updated 4 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- AutoPoC Generator HoneyPoC☆34Updated 6 months ago
- ☆16Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆48Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆62Updated 3 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆32Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago