NetSPI / PowerHunt
PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.
☆64Updated last month
Alternatives and similar repositories for PowerHunt:
Users that are interested in PowerHunt are comparing it to the libraries listed below
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- ☆100Updated 2 years ago
- Pushes Sysmon Configs☆89Updated 3 years ago
- ☆45Updated 3 weeks ago
- ☆106Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆109Updated 7 months ago
- Kerberoast Detection Script☆30Updated 2 months ago
- InfoSec Notes☆56Updated 10 months ago
- ☆81Updated 2 years ago
- Azure AD enumeration over MS Graph☆80Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 9 months ago
- Material for the "Hands-On BloodHound" Workshop☆107Updated 3 years ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆14Updated last year
- DEFCON 31 slide deck and video link☆58Updated 7 months ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆103Updated last month
- GolenGMSA tool for working with GMSA passwords☆138Updated 9 months ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆53Updated 9 years ago
- Reportly is an AzureAD user activity report tool.☆91Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆313Updated 2 years ago
- GoldenSAML Attack Libraries and Framework☆67Updated 7 months ago
- Bloodhound Portable for Windows☆51Updated last year
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆82Updated 5 months ago
- Tool to extract powerful tokens from Office desktop apps memory☆68Updated 10 months ago
- Collection of tools to use with Azure Applications☆107Updated last year
- ☆24Updated 2 years ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆25Updated last year
- ☆36Updated 6 months ago
- Tools for attacking Azure Function Apps☆68Updated 3 months ago