Mr-Un1k0d3r / ATP-PowerShell-Scripts
Microsoft Signed PowerShell scripts
☆212Updated last year
Related projects: ⓘ
- ☆373Updated last year
- DNS Tunneling using powershell to download and execute a payload. Works in CLM.☆213Updated 2 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆289Updated 3 months ago
- A C# utility for interacting with SCCM☆552Updated this week
- Stop Defender Service using C# via Token Impersonation☆171Updated 2 years ago
- ☆327Updated last week
- ☆430Updated last year
- A User Impersonation tool - via Token or Shellcode injection☆397Updated 2 years ago
- ☆400Updated 9 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆360Updated last year
- Finding all things on-prem Microsoft for password spraying and enumeration.☆251Updated 2 years ago
- Run Powershell without software restrictions.☆278Updated 3 years ago
- Some scripts to abuse kerberos using Powershell☆307Updated last year
- FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE acces…☆385Updated last month
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆371Updated 5 months ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 2 years ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆244Updated 2 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆227Updated 2 years ago
- PowerShell Constrained Language Mode Bypass☆221Updated 3 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆441Updated last year
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆249Updated 2 years ago
- ☆290Updated last year
- Active Directory delegation management tool☆277Updated last year
- ☆200Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆187Updated 2 years ago
- Recovering NTLM hashes from Credential Guard☆326Updated last year
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆360Updated 2 years ago
- ☆262Updated last week
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆6Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆475Updated last year