Powershell tools used for Red Team / Pentesting.
☆81Jan 8, 2024Updated 2 years ago
Alternatives and similar repositories for PowerTools
Users that are interested in PowerTools are comparing it to the libraries listed below
Sorting:
- ☆13Dec 21, 2023Updated 2 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆145May 17, 2024Updated last year
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆41Oct 19, 2023Updated 2 years ago
- Hodor for node.js☆15Jun 18, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- The most average C2 ever (MACE)☆97Apr 9, 2022Updated 3 years ago
- Cloud subdomains identification tool☆62Apr 15, 2025Updated 11 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆43Jun 27, 2023Updated 2 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- A command-line utility for performing reverse DNS lookups☆72Aug 10, 2023Updated 2 years ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆676Feb 17, 2026Updated last month
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆23Nov 6, 2023Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- ☆74Apr 8, 2024Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- ☆13Dec 15, 2024Updated last year
- Nuclei templates for honeypots detection.☆197Nov 7, 2023Updated 2 years ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- ☆70Oct 30, 2023Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆35Feb 2, 2026Updated last month
- NetworkAssessment: Network Compromise Assessment Tool☆94May 31, 2024Updated last year
- Improper Authorization Vulnerability in Confluence Data Center and Server☆59Nov 15, 2023Updated 2 years ago
- Docker Remote API Scanner and Exploit☆180Nov 13, 2023Updated 2 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆55Oct 19, 2023Updated 2 years ago
- PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers☆369May 22, 2023Updated 2 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 8 months ago