Socks proxy server using powershell. Supports local and reverse connections for pivoting.
☆11Oct 7, 2020Updated 5 years ago
Alternatives and similar repositories for Invoke-SocksProxy
Users that are interested in Invoke-SocksProxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆10Feb 13, 2017Updated 9 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆18Mar 24, 2025Updated last year
- Tool to perform lateral movement between AAD joined devices☆66Jun 8, 2022Updated 3 years ago
- ☆36May 27, 2024Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Oct 25, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A ping detection tool for linux☆24Apr 20, 2020Updated 6 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆61Jun 24, 2021Updated 4 years ago
- Standardizing Security Titles☆25Apr 19, 2026Updated last week
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆55Jul 11, 2021Updated 4 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Minimalist Xargs for Windows☆10Dec 5, 2017Updated 8 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Feb 19, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 6 months ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Feb 27, 2025Updated last year
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated last year
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 4 months ago
- This is a Poc for BIGIP iControl unauth RCE☆51Mar 17, 2021Updated 5 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆122Sep 14, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 5 years ago
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- ☆154Apr 24, 2026Updated last week
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- External C2 Using IE COM Objects☆100Feb 24, 2019Updated 7 years ago
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Nov 6, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.☆13Apr 26, 2023Updated 3 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Container Image Signing & Verifying on Ethereum [Testnet]☆17Mar 15, 2022Updated 4 years ago
- ☆14Mar 7, 2023Updated 3 years ago
- Grepable cheat sheets for pentesting. Each sheet one tool.☆11Oct 15, 2020Updated 5 years ago