cpu0x00 / Invoke-AccessCheck
a simple powershell wrapper to automate checking a user's access around the network
β13Updated last year
Alternatives and similar repositories for Invoke-AccessCheck:
Users that are interested in Invoke-AccessCheck are comparing it to the libraries listed below
- Various AD tools needed for penetration testing in one place.β24Updated last year
- π©οΈ Collection of BloodHound queries for Azureβ60Updated 2 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.β36Updated 2 months ago
- IP address filter by Cityβ11Updated 2 months ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.β12Updated last year
- β13Updated 2 months ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.β11Updated 11 months ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prepβ19Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privilegesβ22Updated 4 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous toolsβ87Updated last year
- β51Updated last year
- Extra cmdlets to help with quering security related information from Azureβ13Updated 6 months ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.β34Updated 2 months ago
- β12Updated last week
- fully async implementation of Dirkjan's ROADToolsβ31Updated last week
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small fileβ¦β18Updated 4 months ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacksβ20Updated 3 years ago
- β45Updated last week
- β15Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.β35Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.β55Updated last year
- Python tool to find vulnerable AD object and generating csv reportβ26Updated 2 years ago
- This repository provides a comprehensive collection of detection rules and threat intelligence focused on malicious Chrome extensions supβ¦β8Updated 2 months ago
- β26Updated last year
- SMB Audit Tool you were looking forβ21Updated last year
- A user enumeration tool for Slack.β26Updated 9 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.β37Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Servβ¦β25Updated last year
- β43Updated 8 months ago
- Automatically deploy Nemesisβ20Updated 9 months ago