Adkali / PowerJokerLinks
PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.
☆68Updated last year
Alternatives and similar repositories for PowerJoker
Users that are interested in PowerJoker are comparing it to the libraries listed below
Sorting:
- PowerShell Obfuscator☆226Updated 5 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆83Updated 3 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆106Updated 2 months ago
- ☆106Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆91Updated 2 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆60Updated 3 years ago
- A collection of Cobalt Strike Aggressor scripts.☆109Updated 4 years ago
- Reverse shell that can bypass windows defender detection☆169Updated 2 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆141Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 9 months ago
- ☆25Updated last year
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆80Updated 2 years ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆135Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆46Updated 6 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆208Updated last year
- ☆106Updated 11 months ago
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆139Updated 10 months ago
- Generate FUD backdoors☆262Updated 2 years ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆51Updated 2 years ago
- ☆15Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆175Updated last year
- Script to retrieve the master password of a keepass database <= 2.53.1☆113Updated last year
- My Favorite Offensive Security Scripts☆83Updated 9 months ago
- The Red-book: The Art of Offensive CyberSecurity☆110Updated last month
- Creating a Malicious Macro using MS Word☆25Updated 3 years ago
- Windows Privilege Escalation☆102Updated last year
- ☆95Updated last year
- ☆82Updated 9 months ago