A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts
☆32Feb 12, 2019Updated 7 years ago
Alternatives and similar repositories for Invoke-PWAudit
Users that are interested in Invoke-PWAudit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated last month
- Generate AWS Lambda environment zip files for use by cisagov/domain-scan☆12Oct 11, 2023Updated 2 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- Sniffs sensitive data from interface or pcap☆14Feb 19, 2018Updated 8 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆281Apr 29, 2018Updated 7 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- Quick binary search for NTLM hash dataset☆19Jan 31, 2019Updated 7 years ago
- ☆182Dec 18, 2018Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- A command line remote for a Roku media box.☆17Apr 10, 2015Updated 10 years ago
- Scripts and results for finding domain frontable CloudFront domains☆54Feb 23, 2018Updated 8 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Oct 7, 2015Updated 10 years ago
- Security related useful Powershell scripts☆19Sep 13, 2019Updated 6 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- ☆18Dec 24, 2018Updated 7 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆97Aug 28, 2016Updated 9 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- OVAL Documentation☆15Aug 4, 2017Updated 8 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- ☆229May 10, 2018Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Dec 24, 2014Updated 11 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- ☆121Oct 6, 2015Updated 10 years ago
- Rogue Synergy server☆18Mar 8, 2017Updated 9 years ago
- Windows PowerShell module to help in the auditing of Active Directory environments.☆50Mar 22, 2017Updated 9 years ago
- ☆23Mar 11, 2014Updated 12 years ago