Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.
☆63Mar 19, 2015Updated 10 years ago
Alternatives and similar repositories for Veil-PowerView
Users that are interested in Veil-PowerView are comparing it to the libraries listed below
Sorting:
- ☆11Jun 12, 2023Updated 2 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆24Updated this week
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Jul 11, 2023Updated 2 years ago
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- My attempts at making life with VMware that little bit easier.☆11Aug 7, 2023Updated 2 years ago
- ☆13Oct 21, 2023Updated 2 years ago
- ☆13Jan 27, 2024Updated 2 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- CVE-2022-0847☆51Mar 7, 2022Updated 3 years ago
- Use PowerShell DSC resources as imperative functions.☆11Sep 30, 2017Updated 8 years ago
- ☆14Mar 19, 2024Updated last year
- Quick test for CVE-2023-26025 behaviours☆13Nov 29, 2023Updated 2 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- CaptureIT can generate GIFs of both the actively selected window or your entire desktop☆32Aug 11, 2018Updated 7 years ago
- PowerShell function to generate an Azure Resource Manager naming convention in accordance with best practices and and naming limitations.☆19Mar 13, 2018Updated 7 years ago
- Say No to CloudFlare☆14Aug 19, 2022Updated 3 years ago
- Small scripts and POCs related to digital forensics☆18Nov 1, 2022Updated 3 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Jul 8, 2019Updated 6 years ago
- LNK to JSON☆14Mar 7, 2019Updated 6 years ago
- ☆36Dec 4, 2025Updated 2 months ago
- SMLets PowerShell based Exchange Connector for controlling Microsoft System Center Service Manager 2016+☆30Feb 23, 2026Updated last week
- CryptnetURLCacheParser is a tool to parse CryptAPI cache files☆21Aug 3, 2024Updated last year
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Rules generated from our investigations.☆204Jun 17, 2025Updated 8 months ago
- Windows 权限提升 BadPotato☆14Jun 12, 2021Updated 4 years ago
- ☆18Apr 16, 2022Updated 3 years ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Automate Windows Defender STIG to 100% Compliance☆19Jul 26, 2024Updated last year
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- ☆74Jun 17, 2025Updated 8 months ago
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆15May 18, 2023Updated 2 years ago