h4cker/windows
2024-09-28 01:40:49 -04:00
..
ldap_enumeration.md Create ldap_enumeration.md 2024-09-28 00:36:20 -04:00
README.md Windows PowerShell Cheat Sheet Link Update 2021-03-07 23:44:33 -08:00
using_bloodhound.md Create using_bloodhound.md 2024-09-28 01:40:49 -04:00

Resources for Windows-based Assessments

Tools used for Windows-based Assessments

  • PowerShell Empire
  • CimSweep
  • Responder - A LLMNR, NBT-NS and MDNS poisoner
  • BloodHound - Six Degrees of Domain Admin
  • AD Control Path - Active Directory Control Paths auditing and graphing tools
  • PowerSploit - A PowerShell Post-Exploitation Framework
  • PowerView - Situational Awareness PowerShell framework
  • PowerSCCM - Functions to facilitate connections to and queries from SCCM databases and WMI interfaces for both offensive and defensive applications.
  • Empire - PowerShell and Python post-exploitation agent
  • Mimikatz - Utility to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory but also perform pass-the-hash, pass-the-ticket or build Golden tickets
  • UACME - Defeating Windows User Account Control
  • Windows System Internals - (Including Sysmon etc.)
  • Hardentools - Collection of simple utilities designed to disable a number of "features" exposed by Windows
  • CrackMapExec - A swiss army knife for pentesting Windows/Active Directory environments

Additional Resources