NetSPI / PowerHunt
PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.
☆65Updated 2 months ago
Alternatives and similar repositories for PowerHunt:
Users that are interested in PowerHunt are comparing it to the libraries listed below
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆93Updated last year
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆54Updated 9 years ago
- Kerberoast Detection Script☆30Updated 4 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- Pushes Sysmon Configs☆89Updated 3 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- ☆46Updated last week
- Bloodhound Portable for Windows☆51Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- Active Directory Purple Team Playbook☆105Updated last year
- ☆100Updated 2 years ago
- Reportly is an AzureAD user activity report tool.☆91Updated last year
- Full of public notes and Utilities☆98Updated 2 weeks ago
- Tool to extract powerful tokens from Office desktop apps memory☆70Updated last year
- ☆82Updated 2 years ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆84Updated 7 months ago
- Monitor your PingCastle scans to highlight the rule diff between two scans☆110Updated 6 months ago
- Expose a lot of MDE telemetry that is not easily accessible in any searchable form☆103Updated 2 months ago
- Community Tasks/Plans for PlumHound Queueing☆23Updated 2 years ago
- ☆51Updated last month
- Baseline a Windows System against LOLBAS☆25Updated 10 months ago
- ☆51Updated 6 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆110Updated 8 months ago
- DEFCON 31 slide deck and video link☆58Updated 8 months ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆31Updated 7 months ago
- InfoSec Notes☆56Updated 11 months ago
- Identify the attack paths in BloodHound breaking your AD tiering☆316Updated 2 years ago
- Azure AD enumeration over MS Graph☆80Updated 2 years ago
- ☆22Updated 2 years ago
- Tools for attacking Azure Function Apps☆68Updated 4 months ago