last-byte / PersistenceSniperLinks
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
☆2,045Updated last year
Alternatives and similar repositories for PersistenceSniper
Users that are interested in PersistenceSniper are comparing it to the libraries listed below
Sorting:
- Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?☆2,121Updated 2 months ago
- You didn't think I'd go and leave the blue team out, right?☆1,728Updated 3 weeks ago
- BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of…☆2,202Updated 2 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,920Updated this week
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,692Updated 3 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,433Updated 3 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,241Updated last year
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,090Updated 2 months ago
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆780Updated 2 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,802Updated last year
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,494Updated 2 weeks ago
- PingCastle - Get Active Directory Security at 80% in 20% of the time☆2,735Updated last week
- A tool for checking if MFA is enabled on multiple Microsoft Services☆1,623Updated 10 months ago
- TeamFiltration is a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts☆1,366Updated 3 months ago
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,464Updated this week
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆861Updated 4 years ago
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,048Updated last year
- ☆1,069Updated last year
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆998Updated 4 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,689Updated 6 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,142Updated 3 weeks ago
- Tool for Active Directory Certificate Services enumeration and abuse☆3,348Updated last month
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,162Updated 3 weeks ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆1,242Updated 6 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,625Updated 3 years ago
- Bloodhound Reporting for Blue and Purple Teams☆1,262Updated 2 months ago
- Azure Security Resources and Notes☆1,698Updated 2 months ago
- ☆518Updated 2 years ago
- AADInternals PowerShell module for administering Azure AD and Office 365☆1,567Updated 3 months ago
- BlueHound - pinpoint the security issues that actually matter☆756Updated 2 years ago