My PowerShell bag of tricks
☆26Aug 2, 2017Updated 8 years ago
Alternatives and similar repositories for PowerShell
Users that are interested in PowerShell are comparing it to the libraries listed below
Sorting:
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Some usefull scripts for PowerShell, including Sniffer, Portscanner, ...☆57Nov 11, 2013Updated 12 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- RouterBrute can Bruteforce/Dictionary attack the login for the Router's Login page☆16Mar 27, 2017Updated 8 years ago
- Resources for increasing power of ath9k devices, such as TP-link WN722N☆17Jun 5, 2015Updated 10 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 2 weeks ago
- Wifi DNS hijacker☆27Feb 12, 2017Updated 9 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Feb 27, 2019Updated 7 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- SMB Named Pipe shell☆69Nov 19, 2024Updated last year
- PowerShell Information Server☆48Oct 26, 2017Updated 8 years ago
- Cloud metadata extraction tools and scripts☆34May 22, 2023Updated 2 years ago
- ☆10Updated this week
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- PowerShell scripts☆11Feb 19, 2018Updated 8 years ago
- This repo is dedicated to a powerpoint exploit☆34Dec 11, 2020Updated 5 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Ejemplos y prácticas utilizados en el curso Aprende a programar desde cero con C# de Microsoft .NET☆13Jan 9, 2026Updated last month
- Going through http://hacking-printers.net/☆39Apr 23, 2017Updated 8 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Jan 28, 2025Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- A highly secure network tunnel based on dynamic keys developed in go language☆13May 31, 2024Updated last year
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as fe…☆10May 9, 2025Updated 9 months ago
- A BugBounty playbook covering vulnerability bypasses, payloads, and quick checks for OWASP Top 10 + extras.☆22Sep 29, 2025Updated 5 months ago
- Interactive python script for exploiting WPS on access points. Works well with Kali 2.0. (Disclaimer: I'm not responsible for any illeg…☆10Sep 25, 2016Updated 9 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago