api0cradle / PowerAL
A Powershell module that helps you identify AppLocker weaknesses
☆165Updated 5 years ago
Alternatives and similar repositories for PowerAL:
Users that are interested in PowerAL are comparing it to the libraries listed below
- PoSh BloodHound Dog Whisperer☆188Updated last year
- ☆73Updated 3 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆119Updated last year
- ☆111Updated 5 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆314Updated 2 years ago
- Material for the "Hands-On BloodHound" Workshop☆107Updated 3 years ago
- GolenGMSA tool for working with GMSA passwords☆139Updated 10 months ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆181Updated 3 years ago
- Python based BloodHound data importer☆145Updated last year
- ☆82Updated 4 years ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆144Updated 4 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- ☆149Updated 3 years ago
- GoldenSAML Attack Libraries and Framework☆67Updated 8 months ago
- ☆126Updated last year
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆93Updated last year
- InsecurePowerShell is PowerShell with some security features removed.☆103Updated 7 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆62Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆166Updated 2 years ago
- ☆320Updated last year
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆214Updated 4 years ago
- ☆256Updated 2 months ago
- ☆60Updated 3 years ago
- Smb Scanner from PingCastle☆123Updated 5 years ago
- Lateral Movement graph for Azure Active Directory☆122Updated 2 years ago
- Audit program for AzureAD☆145Updated last year
- ☆362Updated 6 months ago
- ☆144Updated last week
- ☆256Updated 2 years ago
- Leghorn code for PKI abuse☆32Updated 3 years ago