Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
-
Updated
Aug 8, 2020 - PowerShell
{{ message }}
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
A self-service password management tool for Active Directory
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
This PowerShell Module has multiple functionalities, but one of the signature features of this module is the ability to parse Security logs on Domain Controllers providing easy to use access to AD Events.
The BloodHound C# Ingestor
Make ORMs great again!
Enable drop-in Windows Single Sign On for popular Java web servers.
Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.
A Network Enumeration and Attack Toolset for Windows Active Directory Environments.
A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.
PowerShell module to interact with Active Directory using ADSI and the System.DirectoryServices namespace (.NET Framework)
IdentityServer4 Ldap Extension (OpenLdap or ActiveDirectory)
PowerShell based Active Directory Honey User Account Management with Universal Dashboards
A PowerShell module to deploy active directory decoy objects.
This Repository contains the stuff related to windows Active directory environment exploitation
PowerShell module delivering a lot of Active Directory Forest/Domain information
Active directory Join script for Ubuntu, Debian, CentOS, Linux Mint, Fedora, Kali, Elementary OS and Raspbian with built in failchcheck and debugmode for Ubuntu. "The most advanced and updated AD join script on GITHUB for Linux"
PSEventViewer (Get-Events) is really useful PowerShell wrapper around Get-WinEvent. Provided above example just shows one of the features you may be interested in (simple way of getting “hidden” events data).
OpenLdap port for DotNet Core (Linux\OSX\Windows)
PowerShell Administration scripts
Powershell script helping for domain enumeration - Written while doing the 'Advanced Red Team' lab from pentesteracademy
Login portal for Kubernetes using Active Directory. Provides authentication and SSO for kubectl and for the dashboard.
Reproducible and extensible BloodHound playbooks
Active Directory Dashboard built on Universal Dashboard.
AD Health Check, Send HTML Email, Ping machines, Encrypt Password,Bulk Password,Microsoft Teams,Monitor Certificate expiry, Monitor cert expiry, AD attributes, IP to Hostname, Export AD group, CSV to SQL,Shutdown, Restart, Local Admin, Disk Space, Account expiry,Restore Permissions, Backup permissions, Delete Files Older Than X-Days, export DHCP options,Read Registry,Distribution group AD attributes,Monitor Windows Services,Export Reverse DNS,Task Monitor,Monitor and alert, Exchange Health check,Get Network Info, Export AD Attributes,AD group members, Office 365 Group member, SQL to CSV, Outlook save send attachments, Upload files to FTP,Exchange – Total Messages Sent Received, Set Teams Only Mode, Intune Duplicate Device,Intune Cleanup Not Evaluated, Ownership and Grant Permissions, Write Create Modify Registry , Organization Hierarchy from AD,Azure AD Privileged Identity Management,Intune – Export MAM Devices,Intune Marking devices as Corporate, Dynamic to Static Distribution Group,Monitor Alert Office 365 services,Group Member Count,Bulk Addition external users sharepoint, ADD to Exchange online License Group,All in One Office 365 Powershell,Bulk Addition of Secondary Email, Automate move mailboxes to o365, Addition Modification Termination Exchange users, Monitoring Unified Messaging port,Unified Messaging Extensions Report, Set Default Quota for SharePoint,Bulk Contact Creation and Forwarding, Uploading and Downloading files sftp, Monitoring Sftp file and download, Office 365 groups Write back, CSV parser, Email address update, Email address modify, MDM enrollment, Welcome Email, Intune Welcome Email, remove messages, remove email, SKOB to AD, SKOB to group, PowerApps report, Powerautomate Report, Flow report, Server QA, Server Check List, O365 IP range, IP range Monitor, o365 Admin Roles, memberof extraction, CSV to Excel, Skype Policy, UPN Flip, Rooms Report, License Reconciliation,Intune Bulk Device Removal, Device Removal, Clear Activesync, Lync Account Termination,Lync Account Removal, Enable office 365 services, Enable o365 Services, Export PST, Site collection Report, Office 365 Group Sites, System Admin,ActiveSync Report,White Space,Active Directory attributes, outlook automation, Intune Detect App, Distribution list Fix, Legacy DN, start service, stop service, disable service, Message tracking, Distribution lists report,Distribution groups report,Quota Report, Auto reply, out of office
BloodHound Docker Ready to Use
Add a description, image, and links to the activedirectory topic page so that developers can more easily learn about it.
To associate your repository with the activedirectory topic, visit your repo's landing page and select "manage topics."
There are some duplicated code that could be removed to simplify the resource.
Instead of calling
Get-ADObjecthere we could instead callGet-TargetResource.https://github.com/PowerShell/ActiveDirectoryDsc/blob/c3c93ba1bc1b8168655cc971474dde277d7c9574/DSCResources/MSFT_ADServicePrincipalName/MSFT_ADServicePrincipalName.psm1#L95
Instead of having this code
https://github.com/Power