lordsaibat / finding_windows_privileges
Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compromise if not evaluated. Privileges can override permission causing a gap of perceived effective permission.
☆10Updated 7 years ago
Alternatives and similar repositories for finding_windows_privileges:
Users that are interested in finding_windows_privileges are comparing it to the libraries listed below
- OSSEM Modular☆27Updated 4 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Get all AD objects which are hidden from you☆18Updated 7 years ago
- BloodHound Data Scanner☆44Updated 4 years ago
- Defensive-oriented Active Directory enumeration☆23Updated 9 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- Set of ultra technical notes about AD☆18Updated 6 years ago
- Scripts to query local admins quickly☆9Updated 9 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆51Updated last year
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆17Updated 10 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Updated 6 years ago
- ☆23Updated 9 years ago
- incident response scripts☆19Updated 6 years ago
- ☆11Updated 6 years ago
- Threat Mitigation Strategies☆25Updated last year
- Set of utilities for getting information about Windows Events☆15Updated 6 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- Automated forensics written in PowerShell☆34Updated 5 years ago
- Microsoft Flow Attack Framework☆23Updated 5 years ago
- Custom scripts released for BSidesDC 2016☆14Updated 8 years ago
- ☆31Updated 4 months ago
- ☆18Updated 5 years ago
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆31Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- ☆9Updated 8 years ago
- ☆51Updated 6 years ago
- Windows stuff☆16Updated 5 years ago
- Trace ScriptBlock execution for powershell v2☆40Updated 5 years ago