JohnHammond / PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
☆15Updated 4 years ago
Alternatives and similar repositories for PowerSploit:
Users that are interested in PowerSploit are comparing it to the libraries listed below
- CTFs as you need them☆28Updated last year
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Updated 4 years ago
- ☆80Updated 4 years ago
- ☆48Updated 3 years ago
- Archive of pentestmonkey.net cheat sheets in case the site goes away permanently☆11Updated 5 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆18Updated last year
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆26Updated 4 years ago
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆58Updated 3 years ago
- Ansible playbooks to install various utility and security tools to localhost☆28Updated 5 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆36Updated 5 years ago
- ☆20Updated this week
- Ansible scripts to install tools and files wanted on a new Kali Machine☆30Updated 5 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆32Updated last year
- Tryhackme rooms & tools☆62Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆76Updated 4 years ago
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- ☆76Updated 3 years ago
- Generate common Reverse Shells for Pentesting☆40Updated 3 years ago
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆122Updated 2 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated last year
- These are notes and code from my experience working through the UnderTheWire wargames.☆26Updated 4 years ago
- Exploits for the TryHackMe room hackerNote☆28Updated 5 years ago
- The code and material for my personal open-source website. (Flask, Gunicorn, Certbot)☆78Updated 5 years ago
- ☆28Updated 4 years ago
- A simple Bash script to automate some organization and repetitive tasks while doing TryHackMe or HackTheBox machines☆38Updated last year
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 4 years ago
- CTF toolbox☆22Updated last year