darkoperator / Veil-PowerView
Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.
☆47Updated 9 years ago
Related projects: ⓘ
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆68Updated 2 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆61Updated 5 months ago
- PowerShell script that aim to help uncovering (eventual) persistence mechanisms deployed by a threat actor following an Active Directory …☆92Updated 10 months ago
- Material for the "Hands-On BloodHound" Workshop☆104Updated 3 years ago
- ☆73Updated 2 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 3 years ago
- ☆39Updated 2 months ago
- Bloodhound Portable for Windows☆51Updated last year
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆92Updated 3 years ago
- Modular Enumeration and Password Spraying Framework☆104Updated 5 months ago
- ☆76Updated 4 years ago
- Simple PowerShell script to enable process scanning with Yara.☆86Updated last year
- ☆40Updated 3 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆63Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆47Updated 5 years ago
- TA505+ Adversary Simulation☆64Updated 3 years ago
- ☆25Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆148Updated last year
- ☆50Updated 5 years ago
- InfoSec Notes☆50Updated 5 months ago
- Brute force attack tool for Azure AD Autologon/Seamless SSO - Source: https://arstechnica.com/information-technology/2021/09/new-azure-ac…☆98Updated 2 months ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆102Updated last year
- ☆59Updated 3 years ago
- Fly into Gophish with One Click (Infra Automation)☆42Updated last year
- A tool for auditing network shares in an Active Directory environment☆39Updated 5 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- A collection of Neo4j/BloodHound queries to collect interesting information.☆45Updated 2 years ago