PowerSploit - A PowerShell Post-Exploitation Framework
☆24Dec 18, 2016Updated 9 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- Burp plugin for jxscout☆21May 12, 2025Updated 11 months ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆14May 28, 2025Updated 11 months ago
- An easy tool to generate backdoor with msfvenom (a part from metasploit framework). This tool compiles a malware with popular payload and…☆139Sep 14, 2016Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆11Jan 31, 2020Updated 6 years ago
- An Attack Tool for TCP Session Hijacking☆12Nov 7, 2021Updated 4 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 9 years ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- Various exploits☆10Apr 27, 2017Updated 9 years ago
- A fork of thc-ssl-dos that supports all SSL/TLS implementations, UDP (using DTLS), SOCKS5 proxy and both renegotiation and reconnect atta…☆16Aug 1, 2022Updated 3 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- WiFiDuck for whid injector☆15Apr 13, 2022Updated 4 years ago
- SupplyShield is an open-source application security orchestration framework designed to secure your software supply chain from vulnerabil…☆16Apr 23, 2026Updated last week
- config files such as .vimrc, .bashrc, etc.☆17May 6, 2011Updated 14 years ago
- Javascript library fuzzer. Tries to detect functions which may lead to XSS vulnerabilities if untrusted data is passed to said functions.☆16Oct 6, 2020Updated 5 years ago
- Here will be a rom and kernel downloads☆11Sep 10, 2020Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Nov 11, 2023Updated 2 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- bluebinder is a simple proxy for using android binder based bluetooth through vhci.☆11Apr 24, 2026Updated last week
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Pdfencrypt is a tool to encrypt/lock PDFs☆10Oct 23, 2021Updated 4 years ago
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- The real GPT-4 with image access (You probably don't have access)☆12Mar 17, 2023Updated 3 years ago
- pArAnoIA - Tiny "Secure" Browser☆13Nov 2, 2024Updated last year
- Script to Send Multiple Messages from WhatsApp☆11May 18, 2019Updated 6 years ago
- Framework for Man-In-The-Middle attacks☆15Feb 19, 2018Updated 8 years ago
- ☆27Sep 4, 2017Updated 8 years ago
- the world famous rkhunter☆15Jul 3, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- All my POC related to malware development☆15Feb 19, 2026Updated 2 months ago
- Capture tools for the Swann 2600 DVR☆12Nov 2, 2014Updated 11 years ago
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- Mozilla Firefox Tweaks. Use at your own risk and fun.☆16Nov 27, 2023Updated 2 years ago