wakedxy / pwsh-enum
Powershell commands for enumeration in Windows Active Directory environment.
☆38Updated 2 years ago
Alternatives and similar repositories for pwsh-enum:
Users that are interested in pwsh-enum are comparing it to the libraries listed below
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆508Updated 7 months ago
- ☆38Updated 5 months ago
- VULNSPY regularly retrieves the latest alerts published by the CERT-FR and the related vulnerabilities with their CVSS score and allows y…☆38Updated 2 years ago
- Docker images of the Exegol project☆102Updated this week
- A python tool to automate KeePass discovery and secret extraction.☆477Updated 3 months ago
- Speed up your pentest enumeration☆83Updated last week
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆405Updated last week
- ☆89Updated last week
- ☆17Updated last year
- Identify the accounts most vulnerable to dictionary attacks☆118Updated 7 months ago
- Pre-Built Vulnerable Environments Based on Docker-Compose☆33Updated 2 months ago
- Dominate Active Directory with PowerShell. Inspired by CrackMapExec / NetExec.☆950Updated 2 weeks ago
- ☆159Updated 5 months ago
- Lab used for workshop and CTF☆175Updated last month
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆133Updated last year
- Assess the security of your Active Directory with few or all privileges.☆305Updated last week
- Active Directory Auditing and Enumeration☆436Updated this week
- Outils ESD academy☆56Updated 2 years ago
- Script for generating revshells☆466Updated 6 months ago
- Hardening Active Directory version 2☆307Updated last week
- SwitchToOpen - The open source shift☆52Updated last month
- Active Directory Enumeration and Exploitation☆11Updated 2 weeks ago
- ☆310Updated last year
- A python implementation of doyensec/Session-Hijacking-Visual-Exploitation☆42Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆532Updated 4 months ago
- Intelligence Blocklists: Phishing, Scam Domains☆23Updated this week
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆285Updated 9 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated 4 months ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆198Updated 8 months ago
- Pentest Report Generator☆397Updated this week