Scripts by Jeff Stein
The script entitled "wordlist-variant" will import a text list of words and add variants of each word to the list. The script was ideally designed to increase the size and speed in which a viable wordlist can be generated for use in performing a dictionary attack against passwords or Wi-Fi pre-shared keys however the script can be used for numerous purposes where word variants are needed. The script is designed for any system with Python installed, leveraging Python 3.
The script entitled "Add-empID" will import the AD module and adds data to the employee ID attribute in the user object of Active Directory from an imported CSV file. The script is designed for the Microsoft Windows operating system, leveraging PowerShell 4.0 and above.
The script entitled "Add-MachinetoGroup" will import the AD module and adds objects specified from a prompt to a security group. The script is designed for the Microsoft Windows operating system, leveraging PowerShell 4.0 and above.
The script entitled "Run-ADusercreation" will perform the necessary steps to create an active directory user account for each user contained in a CSV file. The script is designed for the Microsoft Windows operating system, leveraging PowerShell 4.0 and above.
The script entitled "Run-Auditterm" will perform the necessary steps to review the active directory user termination process and prints a log of checks performed. The script is designed for the Microsoft Windows operating system, leveraging PowerShell 4.0 and above. It compliments the Run-Term.ps1 script which I previously posted to automate the active directory user termination process.
The script entitled "Run-Term" will perform the necessary steps to terminate Active Directory and prints log of the steps performed. The script is designed for the Microsoft Windows operating system, leveraging PowerShell 4.0 and above.
This script was a part of my Masters capstone project which covered the security topic of ransomware. The script entitled "Run-RansomRecovery" will audit storage areas in a domain to identify potential encrypted files as a result of a ransomware attack. Original files can be restored from a backup location using the script and clean up the malicious files can be executed from it. The script is designed for the Microsoft Windows operating system, leveraging PowerShell 4.0 and above.
Thoughts Scripts Published Works Courses