chryzsh / awesome-windows-securityLinks
List of Awesome Windows Security Resources
☆308Updated 2 years ago
Alternatives and similar repositories for awesome-windows-security
Users that are interested in awesome-windows-security are comparing it to the libraries listed below
Sorting:
- PowerShell for Pentesters☆174Updated 8 years ago
- Building an Active Directory domain and hacking it☆663Updated 5 years ago
- A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams☆597Updated 5 years ago
- Tricks for penetration testing☆580Updated 5 years ago
- Red Team Tactics, Techniques, and Procedures☆418Updated last month
- A curated list of awesome BloodhoundAD resources☆235Updated 3 years ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Updated last year
- ☆395Updated 2 weeks ago
- Rapid Attack Infrastructure (RAI)☆307Updated 11 months ago
- ☆167Updated 5 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆381Updated 5 years ago
- A Powershell Privilege Escalation Enumeration Script.☆313Updated 7 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆493Updated 6 years ago
- Disposable and resilient red team infrastructure with Terraform☆278Updated 6 years ago
- Red Teaming :: Penetration Testing :: Offensive Security :: OSCP :: OSCE :: CheatSheets :: Tools :: etc...☆147Updated 6 years ago
- Windows Pentest Scripts☆233Updated 7 years ago
- Various PowerShell scripts that may be useful during red team exercise☆947Updated 3 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Updated 3 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆236Updated 5 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆525Updated 3 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆701Updated 5 years ago
- ☆524Updated 3 years ago
- ☆261Updated 3 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆544Updated 2 months ago
- ☆283Updated 7 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆256Updated 3 years ago
- Find vulnerabilities in AD Group Policy☆639Updated 3 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆511Updated 6 years ago
- Network Pivoting Toolkit☆455Updated 2 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago