wakedxy / pwsh-enumLinks
Powershell commands for enumeration in Windows Active Directory environment.
☆42Updated 2 years ago
Alternatives and similar repositories for pwsh-enum
Users that are interested in pwsh-enum are comparing it to the libraries listed below
Sorting:
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆518Updated last year
- Active Directory Mindmap Recipes: A Compromise à la Carte☆138Updated 2 months ago
- ☆37Updated 10 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆428Updated 5 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,087Updated last year
- A python tool to automate KeePass discovery and secret extraction.☆501Updated 8 months ago
- Identify the accounts most vulnerable to dictionary attacks☆122Updated 5 months ago
- Docker images of the Exegol project☆113Updated 3 weeks ago
- Speed up your pentest enumeration☆83Updated 3 weeks ago
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆15Updated 11 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆579Updated last month
- Script for generating revshells☆476Updated 11 months ago
- GLPI vulnerabilities checking tool☆140Updated last week
- ☆314Updated last year
- Pentest Report Generator☆425Updated last week
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆244Updated 2 months ago
- Active Directory pentesting mind map☆453Updated 2 years ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆145Updated last year
- Active Directory Auditing and Enumeration☆473Updated last month
- Internal Network Penetration Test Playbook☆16Updated 3 years ago
- Dominate Active Directory with PowerShell.☆1,049Updated 2 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆729Updated 2 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆377Updated 2 weeks ago
- Outils ESD academy☆57Updated 3 years ago
- Pre-Built Vulnerable Environments Based on Docker-Compose☆35Updated 7 months ago
- A RedTeam Toolkit☆406Updated 2 weeks ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆799Updated 5 months ago
- Hack The Box CPTS, CBBH, CDSA, CWEE, CAPE, CJCA Exam and Lab Reporting / Note-Taking Tool☆259Updated last month
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆313Updated last year
- PowerShell Ransomware Simulator with C2 Server☆487Updated last year