YossiSassi / Get-LoggedOnUserLinks
Gets currently logged-on users on domain computers, to see if they are local admins or not.
☆9Updated 5 years ago
Alternatives and similar repositories for Get-LoggedOnUser
Users that are interested in Get-LoggedOnUser are comparing it to the libraries listed below
Sorting:
- Bloodhound Portable for Windows☆51Updated 2 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Updated 3 years ago
- Triaging Windows event logs based on SANS Poster☆39Updated 2 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆9Updated last year
- Active Directory Toolkit☆20Updated 6 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 4 years ago
- blame Huy☆42Updated 4 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- ☆53Updated 4 years ago
- BloodHound Data Scanner☆45Updated 4 years ago
- A tool to password spray Jenkins instances☆56Updated 6 years ago
- Threat Mitigation Strategies☆25Updated last year
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 3 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated 2 months ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- LAPS module for CrackMapExec☆29Updated 3 years ago
- RDP Checker☆63Updated last year
- ☆40Updated 6 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- ☆41Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Leghorn code for PKI abuse☆32Updated 3 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆26Updated 11 months ago
- Scripts and One-Liners☆22Updated 4 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year