PowerSploit - A PowerShell Post-Exploitation Framework
☆24Dec 18, 2016Updated 9 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- Nanocore download for those who want to do malware analysis on it and study it's behavior as well as play around with its features.☆23Jan 6, 2023Updated 3 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆22Sep 7, 2017Updated 8 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated 2 weeks ago
- A collection of offensive tools I've hacked together for CTFs and such☆20Aug 9, 2016Updated 9 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Gallery Hack Form Our Team☆11Aug 10, 2023Updated 2 years ago
- Example Telegram bot☆10Oct 2, 2023Updated 2 years ago
- Python library for parsing AccessData AD1 images☆33Jun 1, 2023Updated 2 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆10Jul 16, 2024Updated last year
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- it is a trojan at least, half of it is 💀 See Readme☆10Feb 26, 2021Updated 5 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Script to Send Multiple Messages from WhatsApp☆11May 18, 2019Updated 6 years ago
- Arduino project for controlling digital WWA LED strips to act as car DRL and sequential turn signals.☆12Apr 27, 2018Updated 7 years ago
- ☆14Jul 30, 2020Updated 5 years ago
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- ☆14May 14, 2022Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆35May 12, 2024Updated last year
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Apr 13, 2018Updated 7 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- Music Player Daemon monitoring☆10Feb 3, 2015Updated 11 years ago
- WiFiDuck for whid injector☆14Apr 13, 2022Updated 3 years ago
- This powerful apk for gallery hack☆29Sep 25, 2023Updated 2 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- Here will be a rom and kernel downloads☆11Sep 10, 2020Updated 5 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Node module to easily lookup city and state for a US zipcode☆14Dec 28, 2013Updated 12 years ago
- Simple Golang JWT Bruteforcer 2