peewpw / Invoke-WCMDump
PowerShell Script to Dump Windows Credentials from the Credential Manager
☆718Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Invoke-WCMDump
- PowerShell Runspace Post Exploitation Toolkit☆1,523Updated 5 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆806Updated 4 months ago
- Powershell C2 Server and Implants☆573Updated 5 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆822Updated 6 years ago
- PowerShell Scripts I find useful☆737Updated 8 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,092Updated last year
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆629Updated 7 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆448Updated 8 years ago
- Powershell-based Windows Security Auditing Toolbox☆572Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,203Updated 4 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆737Updated 5 years ago
- Exploit the credentials present in files and memory☆837Updated last year
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆632Updated last year
- Socks proxy, and reverse socks server using powershell.☆777Updated 3 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆510Updated 2 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆839Updated last year
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,122Updated 3 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,411Updated 6 years ago
- HTA encryption tool for RedTeams☆1,373Updated 2 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,230Updated 2 years ago
- PowerShell Pass The Hash Utils☆1,480Updated 5 years ago
- Collection of PowerShell scripts☆443Updated 6 years ago
- Various PowerShell scripts that may be useful during red team exercise☆930Updated 2 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,100Updated 7 years ago
- Fileless web browser information extraction☆220Updated 6 years ago
- Not PowerShell☆444Updated 8 years ago
- Run PowerShell command without invoking powershell.exe☆1,476Updated last year
- Red Team Tips as posted by @vysecurity on Twitter☆1,049Updated 4 years ago