jaredhaight / WindowsAttackAndDefenseLab
☆167Updated 5 years ago
Alternatives and similar repositories for WindowsAttackAndDefenseLab:
Users that are interested in WindowsAttackAndDefenseLab are comparing it to the libraries listed below
- A curated list of awesome BloodhoundAD resources☆230Updated 2 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆176Updated last year
- Tool that automates Active Directory enumeration☆89Updated 3 years ago
- Resources for our Active Directory security workshops☆140Updated 3 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆168Updated 4 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆182Updated 5 years ago
- PoSh BloodHound Dog Whisperer☆188Updated last year
- Simulating Adversary Operations☆92Updated 6 years ago
- A HTA shell to assist with breakout assessments.☆112Updated 3 years ago
- Assorted scripts and one off things☆263Updated 5 months ago
- Some .ps1 scripts for pentesting☆132Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆106Updated 5 years ago
- ☆138Updated 5 years ago
- An Insider Threat Toolkit☆149Updated 6 years ago
- Misc. PowerShell scripts☆115Updated 8 years ago
- Responsive Command and Control System☆102Updated 2 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Updated 5 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 5 years ago
- Detect and abuse risky SPNs☆260Updated 7 years ago
- Various Cheat Sheets☆180Updated 3 years ago
- Material for the "Hands-On BloodHound" Workshop☆107Updated 3 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆97Updated 8 years ago
- Fake User Generator for Active Directory Environments☆156Updated 6 years ago
- Domain user enumeration tool☆215Updated last year
- lateral movement techniques that can be used during red team exercises☆269Updated 5 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 4 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆107Updated 2 months ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- ☆57Updated 4 years ago