wakedxy / pwsh-enumLinks
Powershell commands for enumeration in Windows Active Directory environment.
☆42Updated 2 years ago
Alternatives and similar repositories for pwsh-enum
Users that are interested in pwsh-enum are comparing it to the libraries listed below
Sorting:
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆517Updated 11 months ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆132Updated last month
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆145Updated last year
- Internal Network Penetration Test Playbook☆16Updated 3 years ago
- A python tool to automate KeePass discovery and secret extraction.☆495Updated 7 months ago
- Outils ESD academy☆56Updated 3 years ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆239Updated 2 weeks ago
- Script for generating revshells☆473Updated 10 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆425Updated 3 months ago
- Active Directory pentesting mind map☆433Updated 2 years ago
- ☆313Updated last year
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆572Updated 9 months ago
- Scripts for offensive security☆137Updated last month
- Docker images of the Exegol project☆110Updated this week
- ☆37Updated 8 months ago
- ☆49Updated 2 years ago
- Lab solutions and commands from studying for the eLearnSecurity Junior Penetration Tester certificate.☆190Updated 3 years ago
- Pentest Report Generator☆412Updated last month
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆318Updated 2 weeks ago
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆437Updated 4 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆375Updated 5 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,084Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 5 months ago
- Dominate Active Directory with PowerShell.☆1,012Updated 3 weeks ago
- Active Directory Auditing and Enumeration☆466Updated last week
- A general purpose cheat sheet for pentesting and OSCP certification☆188Updated 4 months ago
- Speed up your pentest enumeration☆84Updated last month
- CVE-2024-21413 PoC for THM Lab☆118Updated last year
- Certified Red Team Operator☆417Updated 3 years ago
- Identify the accounts most vulnerable to dictionary attacks☆121Updated 3 months ago