cpu0x00 / Invoke-AccessCheckLinks
a simple powershell wrapper to automate checking a user's access around the network
☆13Updated last year
Alternatives and similar repositories for Invoke-AccessCheck
Users that are interested in Invoke-AccessCheck are comparing it to the libraries listed below
Sorting:
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆42Updated 7 months ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆39Updated this week
- ☆19Updated 2 months ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆20Updated 2 years ago
- 🌩️ Collection of BloodHound queries for Azure☆75Updated 8 months ago
- Custom queries list for BloodHound☆29Updated 2 months ago
- ☆52Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆55Updated 6 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆87Updated last month
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 10 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆83Updated last month
- ☆54Updated 7 months ago
- ☆13Updated 5 months ago
- IP address filter by City☆12Updated 8 months ago
- Extra cmdlets to help with quering security related information from Azure☆13Updated last year
- Most Responder's configuration power in your hand.☆51Updated 8 months ago
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆95Updated 2 years ago
- Artifact monitoring that ensures fairplay☆78Updated 7 months ago
- Claude MCP server to perform analysis on ROADrecon data☆45Updated 5 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- Automatically deploy Nemesis☆21Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- a map for the azure oriented pentests☆66Updated 2 years ago
- ☆46Updated last year
- fully async implementation of Dirkjan's ROADTools☆32Updated 6 months ago
- Living off the land searches for explorer and sharepoint☆90Updated 4 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated last month