nccgroup / PS2
A port scanner written purely in PowerShell.
☆76Updated last year
Related projects ⓘ
Alternatives and complementary repositories for PS2
- Living off the land searches for explorer and sharepoint☆49Updated last week
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- A small script that automates Entra ID persistence with Windows Hello For Business key☆47Updated 3 months ago
- InfoSec Notes☆53Updated 7 months ago
- Microsoft Graph API post-exploitation toolkit☆93Updated 3 months ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆72Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆74Updated 3 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆54Updated 11 months ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆119Updated 3 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- Abuse Azure API permissions for red teaming☆58Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆82Updated last year
- Analyzing AD domains for security risks related to user accounts☆63Updated last year
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆82Updated last year
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆77Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- ☆43Updated 4 months ago
- ☆150Updated 9 months ago
- ☆112Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆43Updated last year
- ☆51Updated last year
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆89Updated last year
- ☆30Updated last month
- ☆34Updated last year
- Tool to extract powerful tokens from Office desktop apps memory☆67Updated 8 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆68Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆29Updated last year