cpu0x00 / Invoke-AccessCheck
a simple powershell wrapper to automate checking a user's access around the network
☆12Updated 9 months ago
Related projects: ⓘ
- Various AD tools needed for penetration testing in one place.☆21Updated last year
- ☆50Updated 7 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆27Updated 3 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆47Updated 3 weeks ago
- ☆45Updated this week
- Extra cmdlets to help with quering security related information from Azure☆13Updated this week
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 5 months ago
- Parses Snaffler output file and generate beautified outputs.☆29Updated 3 weeks ago
- InfoSec focused Custom Roles for AutomatedLab☆69Updated this week
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆81Updated last year
- ☆21Updated this week
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆53Updated 9 months ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆16Updated last year
- ☆51Updated this week
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆80Updated last year
- Hybrid AD utilities for ROADtools☆59Updated last month
- PowerShell Reverse Shell☆60Updated last year
- Custom queries list for BloodHound☆18Updated 3 weeks ago
- Automatically deploy Nemesis☆19Updated 3 months ago
- ☆33Updated 11 months ago
- Most Responder's configuration power in your hand.☆36Updated 6 months ago
- 🌩️ Collection of BloodHound queries for Azure☆40Updated last month
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆35Updated last month
- ☆41Updated 2 years ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆12Updated 6 months ago
- A methodology to formulate attack paths in a quiet manner using a back-to-basics approach. Originally presented at DEFCON/Red Team Villag…☆22Updated 2 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆12Updated 6 months ago
- ☆40Updated last year
- Efflanrs - GUI for Snaffler Output☆18Updated last week
- ☆34Updated 6 months ago