d1pakda5 / PowerShell-for-Pentesters
PowerShell for Pentesters
☆166Updated 7 years ago
Alternatives and similar repositories for PowerShell-for-Pentesters:
Users that are interested in PowerShell-for-Pentesters are comparing it to the libraries listed below
- Domain user enumeration tool☆215Updated last year
- A curated list of awesome BloodhoundAD resources☆232Updated 2 years ago
- ☆257Updated 2 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆215Updated last year
- Powershell crazy and sometimes diabolic scripts☆153Updated 4 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆176Updated last year
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆245Updated 8 months ago
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- ☆518Updated 2 years ago
- A Powershell Privilege Escalation Enumeration Script.☆307Updated 6 years ago
- ☆167Updated 5 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆203Updated 4 years ago
- ☆149Updated last year
- A Linux enumeration script for Hack The Box☆187Updated 5 years ago
- Windows Pentest Scripts☆230Updated 7 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆141Updated last month
- Various Cheat Sheets☆180Updated 3 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆146Updated last year
- Simple script to generate commands to achieve reverse shells.☆116Updated 4 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆215Updated 4 years ago
- Penetration Testing Notes and Playbook (PTP)☆175Updated 6 years ago
- Disposable and resilient red team infrastructure with Terraform☆260Updated 6 years ago
- Microsoft External Attack Tool☆178Updated 2 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- Custom checklists, cheatsheets, links, and scripts☆125Updated 5 years ago
- Web-based check for Windows privesc vulnerabilities☆139Updated last year
- Automating juicy potato local privilege escalation exploit for penetration testers☆140Updated 3 years ago
- Changes for Visual Studio 2013☆116Updated 9 years ago
- Office 365 and Exchange Enumeration☆183Updated 5 years ago