tobor88 / PowerShell-Red-Team
Collection of PowerShell functions a Red Teamer may use in an engagement
☆522Updated last year
Alternatives and similar repositories for PowerShell-Red-Team:
Users that are interested in PowerShell-Red-Team are comparing it to the libraries listed below
- ☆1,585Updated 3 weeks ago
- Course repository for PowerShell for Pentesters Course☆431Updated 3 years ago
- Some notes and examples for cobalt strike's functionality☆1,060Updated 3 years ago
- ☆683Updated 3 months ago
- A PowerShell armoury for security guys and girls☆473Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,101Updated last month
- ☆704Updated 3 months ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,114Updated 5 months ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,172Updated 5 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆778Updated 2 years ago
- The Hunt for Malicious Strings☆1,208Updated 2 years ago
- "Golden" certificates☆676Updated 8 months ago
- Microsoft signed ActiveDirectory PowerShell module☆899Updated 5 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆869Updated 5 months ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆794Updated last month
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆707Updated last year
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆629Updated 2 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,125Updated 11 months ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound, and also supports full-object dumping …☆960Updated last month
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆258Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆555Updated 3 years ago
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆788Updated 6 months ago
- SharpUp is a C# port of various PowerUp functionality.☆1,352Updated last year
- Python version of the C# tool for "Shadow Credentials" attacks☆714Updated 2 weeks ago
- An Office365 User Attack Tool☆636Updated last year
- Windows Local Privilege Escalation from Service Account to System☆797Updated 5 years ago
- PowerShell Ransomware Simulator with C2 Server☆483Updated last year
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆722Updated 3 months ago
- Red Team Attack Lab for TTP testing & research☆566Updated last year
- PowerShell MachineAccountQuota and DNS exploit tools☆1,311Updated 2 years ago