craigdods / C2-SaaS
☆12Updated 7 years ago
Related projects: ⓘ
- Custom scripts released for BSidesDC 2016☆14Updated 7 years ago
- ☆15Updated 6 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆33Updated 5 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 10 years ago
- Set of ultra technical notes about AD☆18Updated 6 years ago
- ☆30Updated 6 years ago
- Network Mapping and Enumeration Framework☆22Updated 8 years ago
- Get all AD objects which are hidden from you☆18Updated 7 years ago
- ☆39Updated 6 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆33Updated 8 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- ☆21Updated this week
- ☆18Updated 7 years ago
- Security related useful Powershell scripts☆19Updated 5 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Updated last year
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆66Updated 6 years ago
- ☆17Updated 7 years ago
- Logged PS Remote Command Wrapper for Blue Team Forensics/IR☆11Updated 6 years ago
- Scripts to query local admins quickly☆9Updated 8 years ago
- Certificate Export Utility☆26Updated 4 years ago
- ☆22Updated 8 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆60Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- ☆20Updated 10 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆26Updated 8 years ago
- Run Managed Assemblies with RunDll☆15Updated 6 years ago
- ☆24Updated 6 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- ☆26Updated 5 years ago