jaredhaight / WindowsAttackAndDefenseLab
☆169Updated 5 years ago
Alternatives and similar repositories for WindowsAttackAndDefenseLab:
Users that are interested in WindowsAttackAndDefenseLab are comparing it to the libraries listed below
- Resources for our Active Directory security workshops☆140Updated 3 years ago
- A curated list of awesome BloodhoundAD resources☆230Updated 2 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆178Updated last year
- Simulating Adversary Operations☆93Updated 7 years ago
- PoSh BloodHound Dog Whisperer☆191Updated last year
- ☆139Updated 5 years ago
- Some .ps1 scripts for pentesting☆131Updated 4 years ago
- ☆257Updated 2 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆183Updated 5 years ago
- Detect and abuse risky SPNs☆262Updated 7 years ago
- ☆58Updated 4 years ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 5 years ago
- A HTA shell to assist with breakout assessments.☆113Updated 3 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆108Updated 6 years ago
- Presentation material presented by Outflank team members at public events.☆187Updated 4 months ago
- A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities☆204Updated 4 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Updated 6 years ago
- An Insider Threat Toolkit☆151Updated 6 years ago
- Smb Scanner from PingCastle☆124Updated 6 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆97Updated 8 years ago
- lateral movement techniques that can be used during red team exercises☆271Updated 5 years ago
- Responsive Command and Control System☆104Updated 2 years ago
- A PowerShell module to deploy active directory decoy objects.☆227Updated 5 years ago
- Assorted scripts and one off things☆268Updated 8 months ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆67Updated 3 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 5 years ago
- Misc. PowerShell scripts☆117Updated 8 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Updated 6 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆168Updated 4 years ago