RemiEscourrou / PowerShellMiscLinks
☆35Updated 2 years ago
Alternatives and similar repositories for PowerShellMisc
Users that are interested in PowerShellMisc are comparing it to the libraries listed below
Sorting:
- ☆45Updated last year
- ☆23Updated 3 years ago
- LAPS module for CrackMapExec☆29Updated 3 years ago
- RDP Checker☆63Updated last year
- A technique for Active Directory domain persistence☆39Updated 2 years ago
- Tool to perform lateral movement between AAD joined devices☆64Updated 3 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Updated 3 years ago
- ☆39Updated 3 years ago
- C# version of NTLMRawUnHide☆72Updated 2 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Updated 2 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆62Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆63Updated 3 years ago
- blame Huy☆42Updated 4 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆128Updated 2 years ago
- ☆107Updated 2 years ago
- ☆36Updated last year
- Fun GUI for Group3rs output log☆37Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- A module for CME that spiders across a domain.☆35Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 3 years ago
- ☆21Updated last year
- ☆63Updated last year
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆54Updated 5 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆92Updated 2 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆31Updated last year
- Validates priv escalation of AD trusts☆47Updated 5 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆107Updated 3 years ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Updated 3 years ago
- Parse SDDL strings☆36Updated last year