yoda66 / PowerStripLinks
☆41Updated 5 years ago
Alternatives and similar repositories for PowerStrip
Users that are interested in PowerStrip are comparing it to the libraries listed below
Sorting:
- ☆77Updated 2 months ago
- Quick and dirty dynamic redirect.rules generator☆165Updated 2 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- ☆54Updated last year
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆165Updated 5 years ago
- Library of sites for categorization☆27Updated 6 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year
- BH Cypher Queries picked up from random places☆39Updated 6 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 3 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- ☆118Updated 5 months ago
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆97Updated last year
- This repo is dedicated to a powerpoint exploit☆34Updated 4 years ago
- Material for the "Hands-On BloodHound" Workshop☆110Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- Merges multiple .nessus files into one file.☆45Updated 2 years ago
- Python based BloodHound data importer☆147Updated 2 years ago
- Password Spraying Script detecting current and previous passwords of Active Directory User☆65Updated 4 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Managed code hooking template.☆108Updated 4 years ago
- PoSh BloodHound Dog Whisperer☆191Updated 2 years ago
- ☆100Updated 10 months ago
- Tool that automates Active Directory enumeration☆88Updated 4 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆86Updated 9 months ago
- Eating 2FA for Breakfast☆58Updated 2 years ago
- ☆117Updated 4 years ago
- ☆48Updated 5 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Updated 8 years ago
- Simple powershell script to find living off land binaries and scripts on a system.☆22Updated 6 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago