dievus / PowerShellForPentestersLinks
Course repository for PowerShell for Pentesters Course
☆433Updated 3 years ago
Alternatives and similar repositories for PowerShellForPentesters
Users that are interested in PowerShellForPentesters are comparing it to the libraries listed below
Sorting:
- ☆811Updated last week
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆480Updated 6 months ago
- Collection of PowerShell functions a Red Teamer may use in an engagement☆542Updated last year
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆215Updated 2 years ago
- Red Team Attack Lab for TTP testing & research☆580Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆363Updated 4 months ago
- SMBeagle - Fileshare auditing tool.☆733Updated 2 weeks ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆724Updated 3 months ago
- A PowerShell armoury for security guys and girls☆470Updated last year
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆408Updated 8 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆553Updated 4 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆476Updated last year
- An active directory laboratory for penetration testing.☆143Updated 4 years ago
- Python3 o365 User Enumeration Tool☆554Updated 9 months ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆494Updated 2 years ago
- Active Directory Auditing and Enumeration☆495Updated last week
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆306Updated 2 years ago
- BloodHound Attack Research Kit☆560Updated 8 months ago
- Active Directory Labs/exams Review☆260Updated 4 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆443Updated 3 years ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆389Updated 4 years ago
- ☆738Updated 9 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆596Updated 3 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆210Updated 5 years ago
- Azure JWT Token Manipulation Toolset☆694Updated 11 months ago
- ☆615Updated 2 years ago
- Active Directory pentesting mind map☆491Updated 2 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆668Updated 2 years ago
- An Office365 User Attack Tool☆643Updated last year
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆858Updated 7 months ago