Adkali / PowerJoker
PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.
☆48Updated 2 months ago
Alternatives and similar repositories for PowerJoker:
Users that are interested in PowerJoker are comparing it to the libraries listed below
- ☆79Updated last month
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆76Updated 2 years ago
- Red Teaming tools and techniques☆50Updated 2 years ago
- A cheatsheet for NetExec☆114Updated last month
- PowerShell Obfuscator☆115Updated 9 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 4 months ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆105Updated last year
- PowerShell Reverse Shell☆61Updated last year
- ☆16Updated 11 months ago
- A collection of Cobalt Strike Aggressor scripts.☆92Updated 3 years ago
- ☆14Updated last year
- Reverse shell that can bypass windows defender detection☆161Updated last year
- Continuous password spraying tool☆174Updated 3 weeks ago
- Creating a Malicious Macro using MS Word☆21Updated 2 years ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆85Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆76Updated last year
- ☆103Updated 6 months ago
- ☆26Updated 2 years ago
- ☆83Updated 2 months ago
- ☆93Updated last year
- ☆19Updated 11 months ago
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆44Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆85Updated 8 months ago
- Malicious powershell scripts loader designed to avoid detection.☆49Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆75Updated 6 months ago