VOYEUR's main purpose is to generate a fast (and pretty) Active Directory report. The tool is developed entirely in PowerShell (a powerful scripting language) without dependencies (just .Net Framework 3.5 and Ofiice Excel if you want an useful and pretty report). The generated report is a perfect starting point for well-established forensic, inc…
☆159Mar 8, 2017Updated 9 years ago
Alternatives and similar repositories for voyeur
Users that are interested in voyeur are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell script useful for Incident Response and security/configuration baselines for Windows Vista and later☆20Feb 23, 2016Updated 10 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Feb 2, 2016Updated 10 years ago
- Windows PowerShell domain scanning tool☆54Apr 23, 2016Updated 10 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆494Jul 29, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This repo contains Powershell scripts used for general hackery.☆583Dec 4, 2024Updated last year
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- ☆19May 31, 2017Updated 8 years ago
- Network Mapping and Enumeration Framework☆22Nov 11, 2015Updated 10 years ago
- PoshSec PowerShell Module☆160May 27, 2018Updated 7 years ago
- Windows PowerShell module to help in the auditing of Active Directory environments.☆51Mar 22, 2017Updated 9 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Auto Domain Admin and Network Exploitation.☆298Dec 21, 2017Updated 8 years ago
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A walkthrough of deploying and configuring a PowerShell Private Gallery to Azure via ARM Templates, DSC Configurations, and Visual Studio…☆12Mar 8, 2017Updated 9 years ago
- PowerShell module containing functions for creating reports on file, folder and share ACL's, storing the reports and comparing them with …☆24May 20, 2016Updated 9 years ago
- Active Directory Control Paths auditing and graphing tools☆679Dec 17, 2020Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆897Aug 20, 2021Updated 4 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- ☆26Jul 18, 2017Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 12 years ago
- Solution for Auditing LAPS usage in an Active Directory environment.☆36Dec 11, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- WebCommander Walnut provides a web interface for Powershell scripts. All scripts are managed and executed on the server. The workflow eng…☆15Oct 11, 2018Updated 7 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Jul 27, 2017Updated 8 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- PowerShell Module with Security cmdlets for security work☆450Feb 27, 2020Updated 6 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆659Aug 19, 2019Updated 6 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- My PowerShell XML module: generate, select, transform and work with XML☆29Feb 22, 2020Updated 6 years ago
- Veil Catapult is no longer supported☆75May 24, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆424Aug 29, 2017Updated 8 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- A Powershell incident response framework☆1,646Nov 22, 2022Updated 3 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Jul 22, 2017Updated 8 years ago
- Easily define in-memory enums, structs, and Win32 functions in PowerShell☆228Oct 14, 2018Updated 7 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 10 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago