cpu0x00 / Invoke-AccessCheck
a simple powershell wrapper to automate checking a user's access around the network
☆13Updated last year
Alternatives and similar repositories for Invoke-AccessCheck:
Users that are interested in Invoke-AccessCheck are comparing it to the libraries listed below
- IP address filter by City☆11Updated 3 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month
- ☆27Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆64Updated 4 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆39Updated 3 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆45Updated last month
- Check the Domain for Local Admin Access☆14Updated 2 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Claude MCP server to perform analysis on ROADrecon data☆36Updated last month
- Living off the land searches for explorer and sharepoint☆80Updated last week
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- An Ansible collection that installs an ADFS deployment with optional configurations.☆30Updated 4 months ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last month
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 5 months ago
- ☆14Updated this week
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 11 months ago
- ☆51Updated last year
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- Custom queries list for BloodHound☆28Updated 8 months ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆12Updated last year
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆36Updated 3 months ago
- ☆40Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year