The-Viper-One / PsMapExec
Dominate Active Directory with PowerShell. Inspired by CrackMapExec / NetExec.
☆953Updated last month
Alternatives and similar repositories for PsMapExec:
Users that are interested in PsMapExec are comparing it to the libraries listed below
- Powershell tool to automate Active Directory enumeration.☆1,094Updated 3 weeks ago
- Dumping DPAPI credz remotely☆1,109Updated 3 weeks ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,585Updated last week
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆710Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆544Updated 5 months ago
- Python version of the C# tool for "Shadow Credentials" attacks☆710Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆736Updated last year
- Just another Powerview alternative☆620Updated this week
- Active Directory Auditing and Enumeration☆448Updated 2 weeks ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆718Updated 3 months ago
- C# Data Collector for BloodHound☆901Updated this week
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,070Updated last month
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆749Updated 2 weeks ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,117Updated 10 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆736Updated 3 weeks ago
- Windows Local Privilege Escalation Cookbook☆1,096Updated 3 months ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping …☆956Updated last month
- ☆677Updated 2 months ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆866Updated 5 months ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆781Updated 2 weeks ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆616Updated 9 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆415Updated last month
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,248Updated last year
- ☆1,581Updated last week
- Useful C2 techniques and cheatsheets learned from engagements☆496Updated 2 weeks ago
- Active Directory certificate abuse.☆1,643Updated 8 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆538Updated last year
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,013Updated 6 months ago
- Another Windows Local Privilege Escalation from Service Account to System☆844Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,943Updated last month