Simple scripts I tinkered with that afford the pentester AV bypass options for l00ting the stuff you need
Allows the pentester a means of executing commands on the remote machine via Powershell's Invoke-WmiMethod
We take advantage of using SMB file access and simply tail the file that receives our command output using Notepad++.
Here's how you can enable the Tail -f feature in Notepad++.
Dumps SAM and SYSTEM files from registry for offline cracking
forces a windows username and password prompt to the victim's desktop and saves results to c:\users\public\creds.log
- automatically determines the current logged in user's username for you
- Forces user to continue trying until they get the password right OR they hit the cancel button
Just a rough draft of me learning some logon winapi stuff using python.
this script attempts to find passwords in your chrome browser and within your wifi passwords and then tests them to see if any are valid. Does some other stuff too like check group memebership and OS version.
Depends on decryptbrowser.py