bensongithub / PowerShellMafiaLinks
☆40Updated 6 years ago
Alternatives and similar repositories for PowerShellMafia
Users that are interested in PowerShellMafia are comparing it to the libraries listed below
Sorting:
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆269Updated last year
- Malicious WMI Events using PowerShell☆391Updated 9 years ago
- Miscellaneous tools for BloodHound☆398Updated last year
- PowerShell Remote Download Cradle Generator & Obfuscator☆842Updated 7 years ago
- ☆526Updated 3 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆441Updated 3 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆219Updated 4 years ago
- C# Data Collector for the BloodHound Project, Version 3☆549Updated 3 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆517Updated 2 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆327Updated 2 years ago
- Open source pre-operation C2 server based on python and powershell☆758Updated 4 years ago
- Exchange privilege escalations to Active Directory☆787Updated 2 years ago
- A PowerShell armoury for security guys and girls☆471Updated last year
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆231Updated 2 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆723Updated 4 years ago
- Detect and abuse risky SPNs☆264Updated 8 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆456Updated 7 years ago
- ☆307Updated 6 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆523Updated 3 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆510Updated 6 years ago
- Generates malicious LNK file payloads for data exfiltration☆422Updated 8 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆299Updated 5 years ago
- Kerberoast attack -pure python-☆436Updated last year
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆633Updated 3 years ago
- An script to perform kerberos bruteforcing by using impacket☆456Updated 3 years ago
- Collection of PowerShell functions a Red Teamer may use in an engagement☆541Updated last year
- A PowerShell module to deploy active directory decoy objects.☆234Updated 5 years ago
- NetSPI PowerShell Scripts☆336Updated 8 months ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆723Updated 2 months ago
- Various PowerShell scripts that may be useful during red team exercise☆949Updated 3 years ago