A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts
☆32Feb 12, 2019Updated 7 years ago
Alternatives and similar repositories for Invoke-PWAudit
Users that are interested in Invoke-PWAudit are comparing it to the libraries listed below
Sorting:
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- ☆182Dec 18, 2018Updated 7 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 6 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- ☆23Mar 11, 2014Updated 11 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Simulates common user behaviour on local and remote Windows hosts.☆281Apr 29, 2018Updated 7 years ago
- Security related useful Powershell scripts☆19Sep 13, 2019Updated 6 years ago
- Sniffs sensitive data from interface or pcap☆14Feb 19, 2018Updated 8 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- Windows PowerShell module to help in the auditing of Active Directory environments.☆50Mar 22, 2017Updated 8 years ago
- ☆229May 10, 2018Updated 7 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Dec 24, 2014Updated 11 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Rogue Synergy server☆18Mar 8, 2017Updated 8 years ago
- ☆18Dec 24, 2018Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- ☆60Mar 28, 2020Updated 5 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- Webshell plugin that works on any Atlassian product employing their plugin framework☆27Nov 20, 2017Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated last week
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago