dmchell / SharpView
C# implementation of harmj0y's PowerView
☆18Updated 4 years ago
Related projects: ⓘ
- Make everyone in your VLAN ASRep roastable☆114Updated 3 months ago
- A Python based ingestor for BloodHound☆81Updated last year
- ☆61Updated 4 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆129Updated 11 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆164Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆102Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆66Updated last month
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆51Updated 2 years ago
- AzureAD Pentest☆15Updated 2 years ago
- Azure AD cheatsheet for the CARTP course☆94Updated 2 years ago
- A cheat sheet for CrackMapExec and NetExec☆31Updated 2 months ago
- A collection of code snippets built to assist with breaking chains.☆114Updated 4 months ago
- ☆75Updated last year
- Powershell script to extract information from boot PXE☆130Updated 5 years ago
- CLI monitor for windows process- & file activity☆67Updated 3 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆259Updated 11 months ago
- ☆110Updated last year
- AV EVASION TECHNIQUES☆68Updated 2 years ago
- generate payloads that force authentication against an attacker machine☆85Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆39Updated 3 months ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆190Updated 9 months ago
- Identifies the bytes that Microsoft Defender flags on.☆75Updated 2 years ago
- Payload Generation Framework☆84Updated 6 months ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆55Updated 6 years ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆114Updated last month
- Impacket is a collection of Python classes for working with network protocols.☆267Updated this week
- linikatz is a tool to attack AD on UNIX☆134Updated 11 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆218Updated last year
- Cortex XDR Config Extractor☆119Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆35Updated last month