Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.
☆64Mar 19, 2015Updated 11 years ago
Alternatives and similar repositories for Veil-PowerView
Users that are interested in Veil-PowerView are comparing it to the libraries listed below
Sorting:
- ☆11Jun 12, 2023Updated 2 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆25Updated this week
- Contacts Synchronization Private Directory Public Directory City Search Profession Search☆11Oct 21, 2017Updated 8 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆13Jan 27, 2024Updated 2 years ago
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- Use PowerShell DSC resources as imperative functions.☆11Sep 30, 2017Updated 8 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- Rules generated from our investigations.☆204Jun 17, 2025Updated 9 months ago
- ☆74Jun 17, 2025Updated 9 months ago
- Say No to CloudFlare☆14Aug 19, 2022Updated 3 years ago
- Quick test for CVE-2023-26025 behaviours☆13Nov 29, 2023Updated 2 years ago
- ☆13Oct 21, 2023Updated 2 years ago
- ☆78Sep 29, 2025Updated 5 months ago
- A python RCE exploit on QNAP-QTS☆15Sep 15, 2020Updated 5 years ago
- Cortex EDR Ransomware protection Bypass☆27Feb 8, 2025Updated last year
- PowerShell function to generate an Azure Resource Manager naming convention in accordance with best practices and and naming limitations.☆19Mar 13, 2018Updated 8 years ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- AD ACL abuse☆393Sep 11, 2025Updated 6 months ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- ☆104Sep 5, 2023Updated 2 years ago
- Lnk crafting and research tools☆147Mar 4, 2026Updated 2 weeks ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆14Jul 8, 2019Updated 6 years ago
- ☆29Feb 16, 2022Updated 4 years ago
- ☆37Dec 4, 2025Updated 3 months ago
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,097May 29, 2024Updated last year
- ☆21Feb 22, 2025Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Configuration Extractor for BlackCat Ransomware☆31Mar 18, 2022Updated 4 years ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- scripts to setup environments for red/blue teams.☆16Nov 30, 2023Updated 2 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago