last-byte / PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
☆1,912Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for PersistenceSniper
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,049Updated last year
- You didn't think I'd go and leave the blue team out, right?☆1,610Updated last year
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,010Updated 7 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,134Updated 2 weeks ago
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,375Updated last month
- Six Degrees of Domain Admin☆1,148Updated this week
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆1,911Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,484Updated last year
- Tool for Active Directory Certificate Services enumeration and abuse☆2,420Updated 3 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,824Updated last week
- Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)☆1,661Updated this week
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,044Updated 2 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,698Updated this week
- Azure Security Resources and Notes☆1,484Updated 5 months ago
- Dumping DPAPI credz remotely☆1,007Updated last week
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆846Updated 3 weeks ago
- Bloodhound Reporting for Blue and Purple Teams☆1,123Updated last month
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆833Updated 2 years ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,172Updated this week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,740Updated last year
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆642Updated last year
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,349Updated last month
- Rapidly Search and Hunt through Windows Forensic Artefacts☆2,877Updated last week
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,802Updated last month
- Extract credentials from lsass remotely☆2,057Updated last month
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,396Updated 2 months ago
- ☆2,189Updated last year
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,531Updated 2 years ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,152Updated 2 weeks ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆1,724Updated 10 months ago