PowerSploit - A PowerShell Post-Exploitation Framework
☆24Dec 18, 2016Updated 9 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated last month
- DKMC - Dont kill my cat - Malicious payload evasion tool☆22Sep 7, 2017Updated 8 years ago
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Jul 28, 2025Updated 7 months ago
- A JMeter sampler for testing REST services.☆25May 31, 2011Updated 14 years ago
- This plugin adds full text search capabilities and many other nifty features from Apache‘s Solr to any Rails model.☆103Aug 27, 2016Updated 9 years ago
- ☆21Aug 22, 2022Updated 3 years ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- ☆18Oct 2, 2018Updated 7 years ago
- CAPE core and community parsers☆18Feb 9, 2026Updated last month
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- ALBERT Persian Playground☆13Jun 12, 2023Updated 2 years ago
- config files such as .vimrc, .bashrc, etc.☆16May 6, 2011Updated 14 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆20Mar 10, 2017Updated 9 years ago
- SupplyShield is an open-source application security orchestration framework designed to secure your software supply chain from vulnerabil…☆16Dec 8, 2025Updated 3 months ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- The real GPT-4 with image access (You probably don't have access)☆12Mar 17, 2023Updated 3 years ago
- A self-contained web server using Jetty and configured to use Spring MVC☆29Nov 11, 2011Updated 14 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- Resources for DFIR. And more.☆11Jul 3, 2024Updated last year
- Script to Send Multiple Messages from WhatsApp☆11May 18, 2019Updated 6 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- the world famous rkhunter☆15Jul 3, 2015Updated 10 years ago
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Aug 25, 2016Updated 9 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- xdebug reverse shell☆22Jan 18, 2018Updated 8 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- Fully based on Advanced Windows exploitation. Kernel driver exploitation, browser exploitation, heap spraying etc....☆14Nov 1, 2020Updated 5 years ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 3 months ago
- Example Telegram bot☆10Oct 2, 2023Updated 2 years ago