{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"PowerHuntShares","owner":"NetSPI","isFork":false,"description":"PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains.","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":2,"issueCount":5,"starsCount":503,"forksCount":75,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-28T16:20:57.446Z"}},{"type":"Public","name":"FuncoPop","owner":"NetSPI","isFork":false,"description":"Tools for attacking Azure Function Apps","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":59,"forksCount":6,"license":"Other","participation":[0,11,6,0,3,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,0,0,0,0,4,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-20T22:47:40.345Z"}},{"type":"Public","name":"PowerUpSQL","owner":"NetSPI","isFork":false,"description":"PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":3,"issueCount":19,"starsCount":2384,"forksCount":461,"license":"Other","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,14,11,20,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-21T17:04:32.958Z"}},{"type":"Public","name":"MicroBurst","owner":"NetSPI","isFork":false,"description":"A collection of scripts for assessing Microsoft Azure security","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":1,"issueCount":3,"starsCount":1948,"forksCount":308,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-15T19:34:16.531Z"}},{"type":"Public","name":"PowerHunt","owner":"NetSPI","isFork":false,"description":"PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":3,"starsCount":58,"forksCount":11,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-25T15:25:44.133Z"}},{"type":"Public","name":"PowerShell","owner":"NetSPI","isFork":false,"description":"NetSPI PowerShell Scripts","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":317,"forksCount":105,"license":null,"participation":[0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-15T18:47:13.111Z"}},{"type":"Public","name":"SQLC2","owner":"NetSPI","isFork":false,"description":"SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and the agent. ","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":1,"starsCount":71,"forksCount":22,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-05T22:11:50.234Z"}},{"type":"Public","name":"PESecurity","owner":"NetSPI","isFork":false,"description":"PowerShell module to check if a Windows binary (EXE/DLL) has been compiled with ASLR, DEP, SafeSEH, StrongNaming, and Authenticode.","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":6,"starsCount":614,"forksCount":152,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-02-08T19:04:36.296Z"}},{"type":"Public","name":"Powershell-Modules","owner":"NetSPI","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":2,"issueCount":5,"starsCount":158,"forksCount":103,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-06-06T15:54:47.297Z"}},{"type":"Public","name":"PS_Reflector","owner":"NetSPI","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":19,"forksCount":14,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2013-10-14T16:57:45.000Z"}},{"type":"Public","name":"PS_CC_Checker","owner":"NetSPI","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":17,"forksCount":14,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2013-10-07T15:19:45.000Z"}},{"type":"Public","name":"SVNentriesParser","owner":"NetSPI","isFork":false,"description":"A powershell script to parse SVN entries files into an HTML directory listing","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":9,"forksCount":9,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2013-08-20T15:14:36.000Z"}},{"type":"Public","name":"PS_MultiCrack","owner":"NetSPI","isFork":false,"description":"A powershell script for cracking halfLMchall password hashes","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":21,"forksCount":10,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2013-02-05T17:52:28.000Z"}}],"repositoryCount":13,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"NetSPI repositories"}