cyberark / ketshashLinks
A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.
☆172Updated 8 months ago
Alternatives and similar repositories for ketshash
Users that are interested in ketshash are comparing it to the libraries listed below
Sorting:
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Updated 6 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Updated last year
- Automated Tactics Techniques & Procedures☆257Updated 2 years ago
- A bunch of useful SSH tools for powershell☆120Updated 7 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆220Updated 7 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Updated 7 years ago
- Simulating Adversary Operations☆96Updated 7 years ago
- Smb Scanner from PingCastle☆124Updated 6 years ago
- ☆164Updated 10 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆141Updated 6 years ago
- PowerShell to Slack C2☆109Updated 7 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Updated 9 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Updated 7 years ago
- Active Directory enumeration from non-domain system.☆118Updated 8 years ago
- Log newly created WMI consumers and processes to the Windows Application event log☆124Updated 7 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆369Updated 6 years ago
- SMB Relay Attack Script☆148Updated 6 years ago
- ☆350Updated 4 years ago
- Liniaal - A communication extension to Ruler☆99Updated 7 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 6 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆108Updated 8 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Updated 8 months ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆200Updated 7 years ago
- ☆82Updated 4 years ago
- Test Blue Team detections without running any attack.☆271Updated last year
- ☆108Updated 8 years ago
- BlueKeep scanner supporting NLA☆167Updated 6 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆97Updated 9 years ago
- Open source Active Directory security audit framework.☆136Updated 7 years ago