π§° Various PowerShell scripts for security, sysadmins, blue and red teamsπ«πΌ
β56Apr 18, 2026Updated last week
Alternatives and similar repositories for PowerShell
Users that are interested in PowerShell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NMAP-AI: AI-Powered Network Scanning & Automation Platform π€ Revolutionizing network scanning with AI-powered automation, intelliβ¦β97Feb 14, 2026Updated 2 months ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and eβ¦β16Oct 13, 2022Updated 3 years ago
- scripts to setup environments for red/blue teams.β16Nov 30, 2023Updated 2 years ago
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and mβ¦β54Aug 9, 2025Updated 8 months ago
- β Manage and create a WiFi Hotspot with PowerShell πΆβ17Dec 25, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- IDAPython scriptsβ15Aug 24, 2017Updated 8 years ago
- HTML and JS website to display library content from plexβ10Dec 20, 2021Updated 4 years ago
- IDA Processor for Compiled YARA Rulesβ28Jan 22, 2019Updated 7 years ago
- Scripts and Tips for Kali Linux Pi-Tail Editionβ11Dec 8, 2023Updated 2 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visitβ29Jan 10, 2026Updated 3 months ago
- 'apk-yara-checker' is a little CLI tool written in Rust to check Yara rules against a folder of APK files.β16Jul 6, 2024Updated last year
- β46Dec 23, 2024Updated last year
- Found resources in my malware researching adventure.β17Dec 18, 2022Updated 3 years ago
- A Python library for sending and receiving Meshtastic packets over UDP transport, enabling integration with network-based nodes and serviβ¦β25Mar 23, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.β22Apr 21, 2026Updated last week
- CTF source code(s) from multiple websites.β10May 4, 2025Updated 11 months ago
- Geting IP Informationsβ27Oct 29, 2024Updated last year
- This is a set of Windows 10/11 tool scripts, from a creation of multiple debloat scripts and gists from github.β10Apr 24, 2025Updated last year
- AgentFM is a peer-to-peer network that turns everyday computers into a decentralized AI supercomputer. AgentFM lets you run massive AI woβ¦β89Updated this week
- IFL - Interactive Functions List (plugin for Binary Ninja)β25Jul 9, 2024Updated last year
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, cβ¦β17Jun 11, 2024Updated last year
- Open-source AI chat app powered by Apple Foundation Models. Runs in any browser. Self-hosted. Private. No cloud.β41Apr 1, 2026Updated 3 weeks ago
- Provides various Windows Server Active Directory (AD) security-focused reports.β109Jan 21, 2026Updated 3 months ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7β16Feb 1, 2026Updated 2 months ago
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)β17Aug 20, 2022Updated 3 years ago
- ToolShell scanner - CVE-2025-53770 and detection informationβ19Dec 7, 2025Updated 4 months ago
- β48Mar 5, 2026Updated last month
- Squid SSL Proxy with SSL Bump for intercepting SSL trafficβ11Sep 10, 2025Updated 7 months ago
- Detect and extract hidden filesβ23Aug 29, 2024Updated last year
- PowerShell cmdlets you may find usefulβ14Jan 8, 2025Updated last year
- Creation of Machine Learning Models using Python and datasets.β17Mar 21, 2019Updated 7 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities π΅οΈββοΈ using Metasploit π. Learn how to idβ¦β13May 25, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Run macOS VM in a Docker! Run near native OSX-KVM in Docker! X11 Forwarding! CI/CD for OS X Security Research! Docker mac Containers.β11Aug 14, 2024Updated last year
- Examples of the obfuscated APKs (using manifesto and/or other techniques)β30Jan 9, 2015Updated 11 years ago
- Just "Harmless" Google dorks for bug huntersβ23Nov 25, 2024Updated last year
- A VS Code Extension to import USB Rubber Ducky keystroke injection payloads quickly!β15Aug 29, 2023Updated 2 years ago
- β22Apr 13, 2026Updated 2 weeks ago
- HackRF Sweep Spectrum Analyzerβ14Apr 21, 2025Updated last year
- Scrape Hacker News repliesβ27Jan 22, 2022Updated 4 years ago