api0cradle / PowerALLinks
A Powershell module that helps you identify AppLocker weaknesses
☆169Updated 5 years ago
Alternatives and similar repositories for PowerAL
Users that are interested in PowerAL are comparing it to the libraries listed below
Sorting:
- PoSh BloodHound Dog Whisperer☆192Updated 2 years ago
- ☆95Updated 5 years ago
- ☆77Updated 3 months ago
- ☆115Updated 6 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆323Updated 2 years ago
- ☆153Updated last year
- GolenGMSA tool for working with GMSA passwords☆162Updated last month
- Material for the "Hands-On BloodHound" Workshop☆110Updated 4 years ago
- Leghorn code for PKI abuse☆32Updated 4 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆123Updated last year
- Python based BloodHound data importer☆147Updated 2 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆148Updated 4 years ago
- ☆107Updated 2 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆192Updated 4 years ago
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆98Updated last year
- ☆107Updated 3 months ago
- Presentation material presented by Outflank team members at public events.☆190Updated last week
- ☆150Updated 4 years ago
- GoldenSAML Attack Libraries and Framework☆73Updated last year
- ☆103Updated 2 years ago
- Lateral Movement graph for Azure Active Directory☆124Updated 2 years ago
- ☆97Updated 3 years ago
- ☆67Updated 4 years ago
- ☆41Updated 5 years ago
- Python DPAPI NG Decryptor for non-Windows Platforms☆63Updated 9 months ago
- AdmPwd project☆87Updated 2 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆53Updated 2 years ago
- BloodHound with a twist of cloud☆81Updated 5 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆62Updated last year