azmatt / windowsEnum
Batch file to help automate Windows enumeration for privilege escalation
☆89Updated 8 years ago
Alternatives and similar repositories for windowsEnum:
Users that are interested in windowsEnum are comparing it to the libraries listed below
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Learnings from OSCP and other random stuff.☆32Updated last year
- 3 tools that work together to simplify reconaissance of Windows File Shares☆165Updated 7 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- ☆52Updated 4 years ago
- Various Cheat Sheets☆181Updated 3 years ago
- Obfuscated Penetration Testing PowerShell scripts☆142Updated 4 months ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆182Updated 5 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Scripts and resources for Red Teaming at CCDC competitions☆99Updated 2 years ago
- pwk notes and scripts☆15Updated 9 years ago
- Misc. PowerShell scripts☆115Updated 8 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 8 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆90Updated 11 years ago
- Responsive Command and Control System☆103Updated 2 years ago
- ☆26Updated 7 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆119Updated 4 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆227Updated 7 years ago
- Reconnaissance tool for Microsoft Office 365☆67Updated 6 years ago
- This is a bash script to bypass 802.1x NAC☆95Updated last year
- Brian's Pentesting and Technical Tips for You☆120Updated 7 months ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆103Updated 7 years ago
- Python Tool for Host Enumeration☆50Updated 7 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 6 years ago
- Some of the scripts I use.☆41Updated 7 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆75Updated 10 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago