cyberguideme / RedTeamPowershellScriptsLinks
Various PowerShell scripts that may be useful during red team exercise
☆22Updated 3 years ago
Alternatives and similar repositories for RedTeamPowershellScripts
Users that are interested in RedTeamPowershellScripts are comparing it to the libraries listed below
Sorting:
- ☆25Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 4 months ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- ☆64Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- ☆93Updated last year
- ☆24Updated 6 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 8 months ago
- ☆21Updated last year
- Web Hacking and Red Teaming MindMap☆74Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- Azure Service Subdomain Enumeration☆61Updated 9 months ago
- This is an AD pentest tools collection☆57Updated 11 months ago
- ☆29Updated 4 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated 2 years ago
- A compilation of important commands, files, and tools used in Pentesting☆53Updated 2 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆82Updated 2 years ago
- ☆40Updated 6 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆35Updated 7 months ago
- ☆36Updated 3 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- ☆11Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- ☆43Updated 2 months ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- ☆55Updated last year