Pentest Everything
search
Ctrlk
GitHubPsMapExec
Pentest Everything
  • Pentest Everything
  • Writeups
  • 💾GitHubarrow-up-right
  • 🔵PsMapExecarrow-up-right
  • Everything
    • Buffer Overflow Guide
    • Everything Active Directory and Windows
      • Active Directory Enumeration
      • ADCS
      • Access Token Manipultion
      • Adversary-in-the-Middle
      • Credential Access
      • Collection
      • Defense Evasion
      • Input Capture
      • Lateral Movement
      • File Execution Methods
      • File Transfer Techniques
      • Forced Coercion
      • LAPS
      • Network Sniffing
      • Persistence
      • Privilege Escalation
      • SCCM / MECM
        • Recon
        • CRED-1 - PXE Abuse
        • CRED-2 - Policy Request Credentials
        • CRED-3 - WMI Local Secrets
        • CRED-4 - CIM Repository
        • CRED-5 - MSSQL Database
        • ELEVATE-2 - Client Push
        • TAKEOVER-2
      • Timeroasting
      • Tools
    • Everything Linux
    • Everything OSINT
    • Everything Web
    • Host Discovery
    • Pivoting and Portforwarding
    • Ports
    • PowerShell
  • Resources
    • Cheat Sheets
    • Hashcat Word lists and Rules
    • Metasploit Modules
    • Misc Snippets
    • GTFOBinsarrow-up-right
    • LOLBASarrow-up-right
    • WADCOMSarrow-up-right
    • Reverse Shell Generatorarrow-up-right
    • OSINT Toolsarrow-up-right
    • Weakpassarrow-up-right
  • Password Filter DLL
  • Dork Cheatsheet
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Everythingchevron-right
  2. Everything Active Directory and Windows

SCCM / MECM

Resources

  • https://github.com/subat0mik/Misconfiguration-Manager/tree/mainarrow-up-right

  • https://www.thehacker.recipes/a-d/movement/sccm-mecmarrow-up-right

  • https://github.com/Orange-Cyberdefense/GOADarrow-up-right

Last updated 1 year ago