bensongithub / PowerShellMafiaLinks
☆41Updated 6 years ago
Alternatives and similar repositories for PowerShellMafia
Users that are interested in PowerShellMafia are comparing it to the libraries listed below
Sorting:
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆270Updated 2 years ago
- A PowerShell armoury for security guys and girls☆470Updated last year
- ☆524Updated 3 years ago
- C# Data Collector for the BloodHound Project, Version 3☆549Updated 3 years ago
- Malicious WMI Events using PowerShell☆391Updated 9 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆326Updated 2 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆218Updated 5 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆842Updated 7 years ago
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆631Updated 3 years ago
- Miscellaneous tools for BloodHound☆399Updated last year
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆442Updated 3 years ago
- Exchange privilege escalations to Active Directory☆793Updated 2 years ago
- Open source pre-operation C2 server based on python and powershell☆761Updated 4 years ago
- Various PowerShell scripts that may be useful during red team exercise☆945Updated 3 years ago
- Detect and abuse risky SPNs☆264Updated 8 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆519Updated 2 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Updated 3 years ago
- Python3 tool to perform password spraying using RDP☆663Updated 2 years ago
- A PowerShell module to deploy active directory decoy objects.☆234Updated 5 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆298Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,038Updated 5 years ago
- Generates malicious LNK file payloads for data exfiltration☆423Updated 8 years ago
- Aggressor scripts I've made for Cobalt Strike☆410Updated 2 years ago
- PowerShell rebuilt in C# for Red Teaming purposes☆994Updated 3 months ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆510Updated 6 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆459Updated 8 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆725Updated 4 years ago
- NetSPI PowerShell Scripts☆336Updated 8 months ago
- Cobalt Strike kit for Lateral Movement☆676Updated 5 years ago
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆447Updated 3 years ago