scipag / KleptoKittyLinks
Invoke-KleptoKitty - Deploys Payloads and collects credentials
☆30Updated 3 years ago
Alternatives and similar repositories for KleptoKitty
Users that are interested in KleptoKitty are comparing it to the libraries listed below
Sorting:
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆35Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- A tool for auditing network shares in an Active Directory environment☆42Updated 6 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- ☆46Updated 2 years ago
- Scripts and One-Liners☆22Updated 4 months ago
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆92Updated 2 months ago
- Custom pentesting tools☆25Updated 4 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆28Updated 2 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Resources for AD penetration testing and security☆32Updated 3 years ago
- ESXi Cyber Security Incident Response Script☆22Updated 9 months ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- ☆36Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- Post-exploitation NTLM password hash extractor☆20Updated 4 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆56Updated 2 years ago
- Azure AD Incident Response☆25Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆58Updated 10 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Updated 2 years ago