Minimalistic-offensive-security-tools
jumpcloud-ADMU
Our great sponsors
Minimalistic-offensive-security-tools | jumpcloud-ADMU | |
---|---|---|
3 | 4 | |
524 | 21 | |
- | - | |
0.0 | 8.5 | |
over 2 years ago | 8 days ago | |
PowerShell | PowerShell | |
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Minimalistic-offensive-security-tools
- Minimalistic TCP and UDP port scanners (port-scan-tcp.ps1 | port-scan-udp.ps1) #infosec #pentest #redteam
-
Powershell brute force attack via rdp
Just need to adjust protocol similar to the way he adjusted the script above for SMB here https://github.com/InfosecMatter/Minimalistic-offensive-security-tools/blob/master/smblogin-extra-mini.ps1 so just do the same for RDP and your set.
jumpcloud-ADMU
-
moving away from mobile / AD binded accounts to local accounts
Ive only ever done it using the JumpCloud converter agent https://github.com/TheJumpCloud/jumpcloud-ADMU/wiki
-
2 Windows 11 machines ADMU failure
i would double/triple check that the profile they’re trying to migrate is not logged into. an example screenshot on what they should see on https://github.com/TheJumpCloud/jumpcloud-ADMU/wiki/Convert-Profile - Currently Active should = False for whatever profile they’re targeting. if this is not the issue, we encourage them to check the logs at C:\windows\temp\JCADMU.log file & then review the error messages to determine root cause
- Convert Windows domain profile to a local user profile
- How do I responsibly remove Active Directory and go domainless?
What are some alternatives?
DSInternals - Directory Services Internals (DSInternals) PowerShell Module and Framework
vulnerable-AD - Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Testimo - Testimo is a PowerShell module for running health checks for Active Directory against a bunch of different tests
AutomatedLab - AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts. It supports all Windows operating systems from 2008 R2 to 2022, some Linux distributions and various products like AD, Exchange, PKI, IIS, etc.
PowerShell - PowerShell functions and scripts (Azure, Active Directory, SCCM, SCSM, Exchange, O365, ...)
mistborn
Pode - Pode is a Cross-Platform PowerShell web framework for creating REST APIs, Web Sites, and TCP/SMTP servers
ConPtyShell - ConPtyShell - Fully Interactive Reverse Shell for Windows
mobile_to_local - Migrate mobile Active Directory account to a local account