wavestone-cdt / powerpxeLinks
Powershell script to extract information from boot PXE
☆151Updated 6 years ago
Alternatives and similar repositories for powerpxe
Users that are interested in powerpxe are comparing it to the libraries listed below
Sorting:
- Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.☆155Updated 3 months ago
- Password spraying tool and Bloodhound integration☆247Updated 10 months ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆153Updated last year
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆343Updated last year
- Active Directory Labs/exams Review☆260Updated 4 years ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆261Updated 7 months ago
- Dumping LAPS from Python☆281Updated 2 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆181Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆345Updated last year
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆114Updated 7 years ago
- generate payloads that force authentication against an attacker machine☆114Updated 3 years ago
- winPEAS, but for Active Directory☆165Updated 7 months ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆356Updated 2 weeks ago
- Kerberoast with ACL abuse capabilities☆579Updated 11 months ago
- C# implementation of harmj0y's PowerView☆38Updated 5 years ago
- A cheatsheet for NetExec☆153Updated 5 months ago
- Aspx reverse shell☆118Updated 5 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆403Updated 10 months ago
- Create a list of possible usernames for bruteforcing☆77Updated last year
- Timeroasting scripts by Tom Tervoort☆374Updated this week
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆215Updated 2 years ago
- ☆242Updated 2 years ago
- ☆97Updated 5 years ago
- Active Directory Wordlists☆104Updated 5 years ago
- Custom Queries - Brought Up to BH4.1 syntax☆267Updated 2 months ago
- Extracts Key Values from .keytab files☆322Updated 5 years ago
- ☆167Updated 2 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆306Updated 2 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆270Updated 2 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆494Updated 2 years ago