Adkali / PowerJoker
PowerJoker is a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.
☆34Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for PowerJoker
- A C2 framework built for my bachelors thesis☆53Updated last week
- ☆14Updated 10 months ago
- ☆99Updated last month
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆54Updated 7 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆36Updated last week
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆25Updated 11 months ago
- Red Teaming tools and techniques☆46Updated last year
- ☆92Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆84Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 10 months ago
- PowerShell Reverse Shell☆61Updated last year
- ☆26Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆63Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆68Updated 2 years ago
- Malicious powershell scripts loader designed to avoid detection.☆36Updated last year
- ☆46Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆64Updated 11 months ago
- Automatic reverse/bind shell generator cheat sheet.☆35Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆83Updated last year
- Collection of extra pentest tools for Kali Linux☆94Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆32Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆103Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆59Updated 2 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆85Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆67Updated last year
- My Favorite Offensive Security Scripts☆62Updated last year
- ☆16Updated 6 months ago