HarmJ0y / PowerShellArsenal
A PowerShell Module Dedicated to Reverse Engineering
☆14Updated 5 years ago
Alternatives and similar repositories for PowerShellArsenal:
Users that are interested in PowerShellArsenal are comparing it to the libraries listed below
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- ☆34Updated 3 weeks ago
- Defensive-oriented Active Directory enumeration☆23Updated 9 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆13Updated 2 years ago
- ☆12Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆14Updated 7 years ago
- Red Team Tool Kit☆15Updated 5 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆18Updated 7 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Custom pentesting tools☆24Updated 4 years ago
- Hashes of infamous malware☆25Updated last year
- Powershell-based Windows Security Auditing Toolbox☆10Updated 7 years ago
- Post-exploitation NTLM password hash extractor☆19Updated 3 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- Miscellaneous for various things☆22Updated 2 months ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago