tmenochet / PowerSprayLinks
Offensive tool for guessing Active Directory credentials via Kerberos
☆9Updated last year
Alternatives and similar repositories for PowerSpray
Users that are interested in PowerSpray are comparing it to the libraries listed below
Sorting:
- ☆23Updated 3 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆36Updated 3 years ago
- Tool to perform lateral movement between AAD joined devices☆64Updated 3 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- Takes the original idea of NetCease and adds functionality☆24Updated 3 years ago
- blame Huy☆42Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆22Updated 5 months ago
- Quick and dirty PoSH code to read teams messages☆22Updated 5 months ago
- Ansible role that Installs Mythic☆18Updated last year
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Updated last year
- LAPS module for CrackMapExec☆29Updated 3 years ago
- (kinda) Malicious Outlook Reader☆19Updated 4 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Ansible role to deploy RedELK server☆18Updated last year
- ☆18Updated last year
- ☆27Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆19Updated 5 months ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆26Updated last year
- wsnet☆26Updated last month
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Continuous kerberoast monitor☆45Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆49Updated 3 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago