phackt / Invoke-Recon
"Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' lab from pentesteracademy.
☆79Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Invoke-Recon
- A tool to password spray Jenkins instances☆52Updated 5 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Updated 2 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆84Updated last year
- Spray a hash via smb to check for local administrator access☆140Updated 3 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆64Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆92Updated 2 years ago
- ☆8Updated 3 years ago
- Collection of cyphers for bloodhound☆143Updated 4 months ago
- Checks for signature requirements over LDAP☆92Updated 2 years ago
- An Ansible role for installing Cobalt Strike.☆74Updated 3 months ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆143Updated 4 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 4 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆60Updated 5 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆145Updated last year
- C# tool to discover low hanging fruits☆89Updated last year
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆92Updated 4 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆86Updated 2 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆23Updated 4 years ago
- ☆189Updated 4 years ago
- ☆161Updated last year
- ☆51Updated 6 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆118Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆83Updated 3 years ago
- ☆43Updated 7 years ago
- ☆89Updated 2 years ago
- Various Aggressor Scripts I've Created.☆148Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆62Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- This code was used for the blogpost on secjuice.☆40Updated 5 years ago