PowerSploit - A PowerShell Post-Exploitation Framework
☆14Aug 17, 2020Updated 5 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- ☆18Jan 24, 2017Updated 9 years ago
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Mar 27, 2020Updated 5 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆21Jul 2, 2023Updated 2 years ago
- CTFs as you need them☆30May 3, 2023Updated 2 years ago
- A stream implementation for Python that provides transparent base64 encoding and decoding of an underlying stream.☆17Feb 17, 2023Updated 3 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- This Python code will quickly find duplicates or similarities in sets of data.☆10Feb 6, 2018Updated 8 years ago
- These are my notes and setup scripts while installing and preparing my Arch Linux environment.☆72Jun 22, 2021Updated 4 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- As requested on YouTube, this is an archive of my Python scripts and code that I've used to solve the Natas challenges from OverTheWire.☆27Dec 7, 2021Updated 4 years ago
- The purpose of this repository is to archive any extraneous documents, or anything else that really has no specific category but needs a …☆84Aug 9, 2019Updated 6 years ago
- Ansible playbooks to install various utility and security tools to localhost☆29Aug 5, 2019Updated 6 years ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆150Jul 21, 2022Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- Go bindings for Carina™☆13Feb 6, 2017Updated 9 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated this week
- Python based Discord bot Which allows you to run tools like nmap and amass from discord☆27Oct 23, 2022Updated 3 years ago
- Algorithms of facial recognition through sketches☆13May 9, 2014Updated 11 years ago
- ☆11Jan 7, 2022Updated 4 years ago
- This is an instagram clone project developed using DJANGO2.22 Framework and Bootstrap 4, to replicate Original Instagram with the aim of …☆10Oct 4, 2023Updated 2 years ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago
- dot.files - shell stuff☆19Aug 12, 2023Updated 2 years ago
- ☆12May 4, 2021Updated 4 years ago
- The C Programming Language Book by Brian W. Kernighan and Dennis M. Ritchie - solved exercises☆16Apr 26, 2022Updated 3 years ago
- dotties <3☆18Sep 6, 2021Updated 4 years ago
- ☆13Jul 16, 2021Updated 4 years ago
- Tools to work with the Anki Vector robot☆11Nov 21, 2020Updated 5 years ago
- A communal outpouring of online resources for learning different things in cybersecurity☆473Sep 19, 2021Updated 4 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆35Apr 5, 2023Updated 2 years ago
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆197Aug 9, 2022Updated 3 years ago
- ☆22Aug 28, 2025Updated 6 months ago
- AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!☆15Jan 11, 2020Updated 6 years ago
- Every single VirusShare MD5 hash in a single file.☆19May 10, 2023Updated 2 years ago
- Mail Bot: IMAP client sorting entering emails and triggering operations of your choice☆33Nov 22, 2017Updated 8 years ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 5 years ago
- 🙃 Reverse Shell Cheat Sheet 🙃☆13Mar 11, 2019Updated 7 years ago
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- ☆13Sep 20, 2021Updated 4 years ago
- Research into potential vulnerabilities and risks of auto-generated pseudorandom passwords + Bluetooth Exploit.☆22Oct 24, 2018Updated 7 years ago