kurtjarvis / PowershellActiveDirectoryAbuseLinks
Pentester Academy notes and commands from the CRTP/CRTE/PACES courses
☆14Updated 3 years ago
Alternatives and similar repositories for PowershellActiveDirectoryAbuse
Users that are interested in PowershellActiveDirectoryAbuse are comparing it to the libraries listed below
Sorting:
- Cobalt Strike BOFS☆16Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- ☆25Updated 2 years ago
- Check the Domain for Local Admin Access☆15Updated 4 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆15Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Updated 2 months ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- ☆48Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆2Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 8 months ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- ☆52Updated last year
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- A script used to query the dehashed API and filter for more useful results☆16Updated 4 years ago
- ☆19Updated last year
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- ☆22Updated last year
- ShootCutMe an .LNK file creator tool for redteamer☆13Updated 8 months ago
- OSED Practice binary☆24Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆12Updated last year