LuemmelSec / WinPwnLinks
Automation for internal Windows Penetrationtest / AD-Security
☆19Updated 2 years ago
Alternatives and similar repositories for WinPwn
Users that are interested in WinPwn are comparing it to the libraries listed below
Sorting:
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- blame Huy☆42Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- Python Script for SAML2 Authentication Passwordspray☆39Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- self-hosted Azure OSINT tool☆30Updated 8 months ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Discord C2 Profile for Mythic☆29Updated 3 months ago
- Searching .evtx logs for remote connections☆23Updated last year
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆22Updated 3 years ago
- ☆83Updated 2 years ago
- ☆40Updated 2 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 5 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago