scipag / KleptoKittyLinks
Invoke-KleptoKitty - Deploys Payloads and collects credentials
☆30Updated 3 years ago
Alternatives and similar repositories for KleptoKitty
Users that are interested in KleptoKitty are comparing it to the libraries listed below
Sorting:
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- ☆46Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Query user sessions for the entire domain (Interactive/RDP etc), allowing you to query a Username and see all their logged on sessions, w…☆92Updated 3 months ago
- A tool for auditing network shares in an Active Directory environment☆42Updated 6 years ago
- Post-exploitation NTLM password hash extractor☆20Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Defensive-oriented Active Directory enumeration☆24Updated 9 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Evtx Log (xml) Browser☆56Updated 2 years ago
- Scripts and One-Liners☆22Updated 4 months ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆28Updated 11 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆14Updated 6 years ago
- Build a domain with three quick PowerShell scripts!☆29Updated 5 years ago
- Nessus Preflight(NPF) Check for local and remote systems. Essentially sets three registry keys and restarts a service to allow nessus to …☆16Updated 2 months ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆35Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- ESXi Cyber Security Incident Response Script☆23Updated 9 months ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 6 months ago
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆48Updated last week
- Scans the filesystem for directories that are user-writeable☆11Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- ☆7Updated 2 years ago
- Active Directory Group Policy analyzer☆14Updated 5 years ago