NetSPI / PowerHuntLinks
PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.
☆71Updated last year
Alternatives and similar repositories for PowerHunt
Users that are interested in PowerHunt are comparing it to the libraries listed below
Sorting:
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆97Updated 2 months ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆62Updated 10 years ago
- ☆110Updated 2 years ago
- ☆50Updated last week
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆124Updated 3 years ago
- ☆119Updated 4 years ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆155Updated last month
- ☆53Updated 3 months ago
- Tool to extract powerful tokens from Office desktop apps memory☆72Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆84Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆39Updated 4 years ago
- ☆168Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆97Updated 3 years ago
- Azure AD enumeration over MS Graph☆82Updated 3 years ago
- Kerberoast Detection Script☆30Updated last year
- ☆105Updated 3 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆35Updated last year
- Reportly is an AzureAD user activity report tool.☆95Updated 2 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Updated last year
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆113Updated 5 months ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- GoldenSAML Attack Libraries and Framework☆77Updated last year
- ESXi Cyber Security Incident Response Script☆25Updated last year
- DEFCON 31 slide deck and video link☆66Updated 7 months ago
- ☆33Updated last year
- Scripts to enumerate and report on Entra Conditional Access☆41Updated 4 months ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆126Updated 3 years ago
- ☆28Updated 3 years ago