api0cradle / PowerALLinks
A Powershell module that helps you identify AppLocker weaknesses
☆168Updated 5 years ago
Alternatives and similar repositories for PowerAL
Users that are interested in PowerAL are comparing it to the libraries listed below
Sorting:
- PoSh BloodHound Dog Whisperer☆192Updated 2 years ago
- ☆77Updated 3 months ago
- ☆115Updated 6 years ago
- Identify the attack paths in BloodHound breaking your AD tiering☆323Updated 2 years ago
- ☆96Updated 5 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆124Updated last year
- Material for the "Hands-On BloodHound" Workshop☆110Updated 4 years ago
- ☆153Updated last year
- GolenGMSA tool for working with GMSA passwords☆163Updated 2 months ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆149Updated 4 years ago
- Python based BloodHound data importer☆147Updated 2 years ago
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆99Updated last year
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆194Updated 4 years ago
- Leghorn code for PKI abuse☆32Updated 4 years ago
- GoldenSAML Attack Libraries and Framework☆75Updated last year
- ☆151Updated 4 years ago
- ☆107Updated 2 years ago
- Lateral Movement graph for Azure Active Directory☆124Updated 2 years ago
- ☆41Updated 5 years ago
- ☆103Updated 2 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆67Updated 5 years ago
- ☆97Updated 3 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆94Updated 3 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆230Updated 4 years ago
- Audit program for AzureAD☆149Updated 2 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆60Updated 10 years ago
- ☆67Updated 4 years ago
- Presentation material presented by Outflank team members at public events.☆191Updated 3 weeks ago
- BloodHound with a twist of cloud☆81Updated 5 years ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆96Updated 3 months ago