secopsconsult / powershellLinks
Useful Powershell modules.
☆11Updated 8 years ago
Alternatives and similar repositories for powershell
Users that are interested in powershell are comparing it to the libraries listed below
Sorting:
- Slides from various talks that I've given over the years☆118Updated 2 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆105Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- ☆61Updated 7 years ago
- Windows PowerShell domain scanning tool☆54Updated 9 years ago
- Automated enumeration☆30Updated 4 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 10 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Updated 7 years ago
- Materials of Workshop presented at DEFCON 25☆107Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 8 years ago
- ☆97Updated 9 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- ☆25Updated 9 years ago
- Common Findings Database☆101Updated 6 years ago
- A ton of helpful tools☆39Updated 4 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Powershell Empire Persistence finder☆119Updated 9 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Updated 9 years ago
- Queries to parse sysmon event log file with microsoft logparser☆58Updated 10 years ago
- Some simple and useful tools☆15Updated 7 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Updated 5 years ago