LuemmelSec / WinPwn
Automation for internal Windows Penetrationtest / AD-Security
☆19Updated last year
Alternatives and similar repositories for WinPwn
Users that are interested in WinPwn are comparing it to the libraries listed below
Sorting:
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Continuous kerberoast monitor☆45Updated last year
- ☆82Updated 2 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- blame Huy☆42Updated 4 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆27Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆28Updated 5 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆27Updated 2 years ago
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆83Updated 2 years ago
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- ☆44Updated 10 months ago
- ☆32Updated 5 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- AutoPoC Generator HoneyPoC☆35Updated 3 weeks ago
- ☆64Updated 2 weeks ago
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- .Net Assembly loader for the GMSAPasswordReader☆12Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- ☆55Updated last year