Simulates common user behaviour on local and remote Windows hosts.
☆281Apr 29, 2018Updated 7 years ago
Alternatives and similar repositories for Invoke-UserSimulator
Users that are interested in Invoke-UserSimulator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sheepl : Creating realistic user behaviour for supporting tradecraft development within lab environments☆401Feb 27, 2024Updated 2 years ago
- Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.☆492Feb 16, 2019Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- ☆98Feb 21, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Search for categorized domain☆457Jan 15, 2019Updated 7 years ago
- Assorted scripts and one off things☆271Aug 20, 2024Updated last year
- ☆166Feb 13, 2020Updated 6 years ago
- PowerDNS: Powershell DNS Delivery☆216Sep 26, 2018Updated 7 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- PowerShell Scripts focused on Post-Exploitation Capabilities☆320Dec 29, 2017Updated 8 years ago
- Rapid Attack Infrastructure (RAI)☆310Nov 24, 2024Updated last year
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Chameleon: A tool for evading Proxy categorisation☆512Nov 28, 2024Updated last year
- Aggressor scripts for phases of a pen test or red team assessment☆184Aug 13, 2024Updated last year
- One-off scripts☆52Sep 4, 2017Updated 8 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆274Jan 27, 2021Updated 5 years ago
- Search for potential frontable domains☆643Mar 22, 2023Updated 3 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆169Aug 10, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PowerShell Remote Download Cradle Generator & Obfuscator☆851Mar 23, 2018Updated 8 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆935Jun 1, 2021Updated 4 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Feb 7, 2019Updated 7 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,017Jul 3, 2018Updated 7 years ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆382Jul 25, 2019Updated 6 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Malicious Macro Generator☆830Apr 17, 2019Updated 6 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆120Aug 27, 2019Updated 6 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 7 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆845Jun 25, 2024Updated last year
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,650Oct 11, 2018Updated 7 years ago