0x4F776C / PowerSnailLinks
PowerShell alternative/restriction bypass
☆11Updated 10 months ago
Alternatives and similar repositories for PowerSnail
Users that are interested in PowerSnail are comparing it to the libraries listed below
Sorting:
- Custom pentesting tools☆26Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 3 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆24Updated 2 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 4 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Updated 2 weeks ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- Reverse shell macro using Word VBA☆17Updated 5 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆44Updated 2 months ago
- Easy to configure Honeypot for Blue Team☆43Updated 7 months ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Updated 7 years ago
- ☆24Updated 6 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- Lightweight File Integrity Monitoring Tool☆33Updated last year
- Ideaslocas Repository☆37Updated 4 years ago
- Curated list of well-developed C# Offensive Tools☆20Updated 6 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 5 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- ☆26Updated 3 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆60Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 3 years ago