S3cur3Th1sSh1t / GrouperLinks
A PowerShell script for helping to find vulnerable settings in AD Group Policy.
☆14Updated 6 years ago
Alternatives and similar repositories for Grouper
Users that are interested in Grouper are comparing it to the libraries listed below
Sorting:
- Collection of extra pentest tools for Kali Linux☆109Updated last week
- Custom pentesting tools☆25Updated 4 years ago
- Resources for AD penetration testing and security☆32Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Scripts and One-Liners☆22Updated 7 months ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago
- A port scanner written purely in PowerShell.☆80Updated 2 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 3 months ago
- ☆29Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 6 years ago
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated last year
- AutoPoC Generator HoneyPoC☆35Updated 5 months ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆17Updated 6 years ago
- A set of instructions, command and techniques that help during an Active Directory Assessment.☆88Updated 4 years ago