jaredhaight / WindowsAttackAndDefenseLab
☆166Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for WindowsAttackAndDefenseLab
- A curated list of awesome BloodhoundAD resources☆226Updated 2 years ago
- Resources for our Active Directory security workshops☆139Updated 3 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆174Updated last year
- Slides from my talk in "Hackinparis" 2019 edition☆89Updated 5 years ago
- PoSh BloodHound Dog Whisperer☆187Updated last year
- Detect possible sysmon logging bypasses given a specific configuration☆107Updated 5 years ago
- An Insider Threat Toolkit☆149Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆105Updated 4 years ago
- A HTA shell to assist with breakout assessments.☆112Updated 3 years ago
- ☆137Updated 4 years ago
- Tool that automates Active Directory enumeration☆88Updated 3 years ago
- Assorted scripts and one off things☆259Updated 2 months ago
- Simulating Adversary Operations☆93Updated 6 years ago
- ☆73Updated 2 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆167Updated 4 years ago
- Presentation material presented by Outflank team members at public events.☆178Updated 4 months ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Updated 5 years ago
- Material for the "Hands-On BloodHound" Workshop☆105Updated 3 years ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆201Updated 4 years ago
- Some .ps1 scripts for pentesting☆131Updated 4 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆92Updated 8 years ago
- TA505+ Adversary Simulation☆65Updated 3 years ago
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆38Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆102Updated last year
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆61Updated 2 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆123Updated 5 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆92Updated 2 years ago