cpu0x00 / Invoke-AccessCheck
a simple powershell wrapper to automate checking a user's access around the network
☆13Updated last year
Alternatives and similar repositories for Invoke-AccessCheck:
Users that are interested in Invoke-AccessCheck are comparing it to the libraries listed below
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- IP address filter by City☆11Updated 2 months ago
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆41Updated last month
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- ☆14Updated 3 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆37Updated 2 months ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆36Updated 2 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 4 months ago
- 🌩️ Collection of BloodHound queries for Azure☆63Updated 3 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated last year
- ☆27Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆56Updated 3 weeks ago
- Check the Domain for Local Admin Access☆13Updated last month
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆12Updated last year
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆19Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆27Updated 2 weeks ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆28Updated 3 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 11 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Automatically deploy Nemesis☆20Updated 10 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- Scripts that automate portions of pentests.☆45Updated last week
- Living off the land searches for explorer and sharepoint☆78Updated 5 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated 11 months ago
- Claude MCP server to perform analysis on ROADrecon data☆30Updated 2 weeks ago
- ☆12Updated this week
- ☆43Updated 9 months ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆21Updated 3 years ago