Some security related PowerShell scripts I developed.
☆79Aug 6, 2018Updated 7 years ago
Alternatives and similar repositories for PowerShell
Users that are interested in PowerShell are comparing it to the libraries listed below
Sorting:
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Powershell-based Windows Security Auditing Toolbox☆573Jan 9, 2019Updated 7 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- EventList☆377Mar 21, 2021Updated 4 years ago
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- A PowerShell script that aims to have a fully configured domain built in under 10 minutes, but also apply security configuration and hard…☆201Mar 27, 2021Updated 4 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- A repo for documents containing curated list of health and (in the future security) checks to be run against a Windows Active-Directory d…☆169Jul 29, 2019Updated 6 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆492Feb 16, 2019Updated 7 years ago
- Pester infrastructure checks for ActiveDirectory☆26Jul 10, 2019Updated 6 years ago
- Some PowerShell Stuff☆280Jun 15, 2022Updated 3 years ago
- ☆18Jul 24, 2019Updated 6 years ago
- ☆16Jul 20, 2020Updated 5 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Apr 7, 2020Updated 5 years ago
- Some .ps1 scripts for pentesting☆140Jan 6, 2026Updated last month
- Code, Materials and Slides for psconf.eu 2019☆72Jan 23, 2023Updated 3 years ago
- A HTA shell to assist with breakout assessments.☆113Oct 20, 2021Updated 4 years ago
- Module for interact with ADMX and ADML files.☆21Oct 12, 2020Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆331Oct 20, 2019Updated 6 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 6 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆178Dec 18, 2019Updated 6 years ago
- ObscurityLabs RedTeam C# Toolkit☆123Sep 3, 2019Updated 6 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Jun 1, 2018Updated 7 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- PowerShell module to interact with Active Directory using ADSI and the System.DirectoryServices namespace (.NET Framework)☆204Oct 28, 2020Updated 5 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- IDS Bypass tricks☆122Jan 11, 2019Updated 7 years ago
- Word 2016 vulnerability allows injecting HTML/JS code into a docx file's embeddedHTML="" tags.☆96Dec 10, 2018Updated 7 years ago
- Run Rubeus via Rundll32☆207Apr 25, 2020Updated 5 years ago
- ☆208May 1, 2020Updated 5 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Aug 10, 2018Updated 7 years ago
- Exchange privilege escalations to Active Directory☆806Apr 23, 2023Updated 2 years ago