A PowerShell Module Dedicated to Reverse Engineering
☆15Jan 17, 2020Updated 6 years ago
Alternatives and similar repositories for PowerShellArsenal
Users that are interested in PowerShellArsenal are comparing it to the libraries listed below
Sorting:
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Menubar app to show running servers on localhost☆13Jan 31, 2021Updated 5 years ago
- Misc. PowerShell scripts☆119Jul 4, 2016Updated 9 years ago
- Tool to perform Brute Force Attack FTP☆11Jan 23, 2020Updated 6 years ago
- Backup☆10Oct 6, 2025Updated 5 months ago
- Examples of applying Kasiski examination and Index of Coincidence along with Frequency analysis to restore cryptographic key of Vigenere …☆20Feb 4, 2024Updated 2 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- ☆46Sep 12, 2019Updated 6 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- XSS PoCs to elevate your alert()☆22May 18, 2023Updated 2 years ago
- ct (Command Trace) is a Bash command resolution tracer that explains how Bash resolves a command and what the kernel ultimately executes.…☆93Feb 7, 2026Updated last month
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Nov 26, 2025Updated 3 months ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 3 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆33Oct 15, 2019Updated 6 years ago
- Wordpress.org svn repositories spider☆12Aug 4, 2014Updated 11 years ago
- ☆11Feb 6, 2019Updated 7 years ago
- An Awesome List for getting started with web archiving☆19Dec 21, 2018Updated 7 years ago
- Zero downtime restart and graceful shutdown in one line of code☆11Jul 24, 2020Updated 5 years ago
- Tool for dictionary attack with fail2ban bypass.☆16Jan 8, 2022Updated 4 years ago
- ☆28Feb 11, 2016Updated 10 years ago
- Standalone, local-runnable binaries of popular linux distributions☆10Dec 15, 2021Updated 4 years ago
- Search Termux Commands and Guide in Termux !!☆11Apr 29, 2022Updated 3 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Lightweight Linux for Docker☆11Nov 20, 2018Updated 7 years ago
- 💣 Dockerized penetration-testing/bugbounty/app-sec testing environment☆33Nov 24, 2021Updated 4 years ago
- OpenRAN Gym website☆12Dec 11, 2025Updated 3 months ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆25Jul 19, 2024Updated last year
- A place for personal ad hoc scripts☆10Jun 9, 2021Updated 4 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- ☆34Jan 22, 2025Updated last year
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago