last-byte / PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
☆1,942Updated last month
Alternatives and similar repositories for PersistenceSniper:
Users that are interested in PersistenceSniper are comparing it to the libraries listed below
- You didn't think I'd go and leave the blue team out, right?☆1,631Updated last year
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,075Updated last year
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,042Updated 9 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,209Updated 2 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,513Updated 2 years ago
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,055Updated 4 months ago
- Six Degrees of Domain Admin☆1,280Updated this week
- Active Directory ACL Visualizer and Explorer - who's really Domain Admin? (Commerical versions available from NetSection)☆1,805Updated last week
- Tool for Active Directory Certificate Services enumeration and abuse☆2,514Updated 4 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆2,996Updated 2 weeks ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆1,975Updated last week
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,404Updated 3 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,860Updated last month
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,032Updated last year
- Automation for internal Windows Penetrationtest / AD-Security☆3,405Updated last month
- Azure Security Resources and Notes☆1,511Updated 7 months ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆774Updated last year
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,404Updated 3 months ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,006Updated 2 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,743Updated 2 weeks ago
- Bloodhound Reporting for Blue and Purple Teams☆1,138Updated 3 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,858Updated this week
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆554Updated 3 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,584Updated last month
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,197Updated last month
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆837Updated 2 years ago
- Active Directory certificate abuse.☆1,565Updated 5 months ago
- Dumping DPAPI credz remotely☆1,044Updated 2 months ago
- ☆2,217Updated last year
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,086Updated 7 months ago