Exploit-install / PowerSploitLinks
PowerSploit - A PowerShell Post-Exploitation Framework
☆24Updated 9 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- SMBMap is a handy SMB enumeration tool☆38Updated last year
- AV/EDR evasion via direct system calls.☆32Updated 5 years ago
- One line PS scripts that may come handy during your network assesment☆79Updated 5 years ago
- Automated 802.1x Bypass☆87Updated 5 years ago
- PowerShell payload generator☆120Updated 4 years ago
- Customized Kali Linux - Ansible playbook☆67Updated 5 years ago
- Tool for password spraying RDP☆98Updated 7 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆145Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆53Updated 3 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 6 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 6 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆42Updated 11 months ago
- ☆54Updated 7 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 6 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- Platform independent peCloak fork based on Capstone☆107Updated 9 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆115Updated 5 years ago
- Post-exploitation NTLM password hash extractor☆19Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆120Updated last year
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆113Updated last year
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆81Updated 7 years ago
- A shell script that mimics sudo and sends you back the password☆45Updated 3 years ago
- ☆42Updated 7 years ago
- A simple "ransomware" using powershell☆14Updated 4 years ago
- Windows RID Hijacking persistence technique☆178Updated last year
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Updated 6 years ago