PwnDexter / Invoke-EDRCheckerLinks
Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories, installed services, the registry and running drivers for the presence of known defensive products such as AV's, EDR's and logging tools.
☆274Updated 2 years ago
Alternatives and similar repositories for Invoke-EDRChecker
Users that are interested in Invoke-EDRChecker are comparing it to the libraries listed below
Sorting:
- Dumping LAPS from Python☆282Updated 3 years ago
- NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The …☆386Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆309Updated 2 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆240Updated 2 years ago
- ☆408Updated 8 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆499Updated 3 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆410Updated 10 months ago
- Bypass AMSI by patching AmsiScanBuffer☆278Updated 4 years ago
- ☆413Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆238Updated 4 years ago
- Kerberoast attack -pure python-☆435Updated 2 years ago
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆448Updated 2 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Updated 5 months ago
- Enumerate Domain Data☆335Updated 2 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆252Updated 2 months ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆500Updated 2 years ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆389Updated 2 years ago
- Password spraying tool and Bloodhound integration☆248Updated last year
- ☆252Updated 2 years ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆431Updated last year
- scan for NTLM directories☆377Updated 5 months ago
- "Golden" certificates☆707Updated last year
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆737Updated 3 months ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆173Updated 10 months ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆478Updated 3 years ago
- ☆200Updated 6 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆923Updated 4 years ago
- Password spraying and bruteforcing tool for Active Directory Domain Services☆384Updated last year
- Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.☆333Updated 3 years ago
- ☆413Updated 2 years ago