JohnHammond / PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
☆15Updated 4 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- CTFs as you need them☆28Updated 2 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆19Updated last year
- Archive of pentestmonkey.net cheat sheets in case the site goes away permanently☆11Updated 5 years ago
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 2 years ago
- Ansible playbooks to install various utility and security tools to localhost☆29Updated 5 years ago
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆123Updated 2 years ago
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆16Updated 5 years ago
- My adhoc and abhorrent notes and work for TryHackMe machines. This repository is for personal use but is made public in case other someho…☆59Updated 3 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆37Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆62Updated 5 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆42Updated 4 years ago
- Tryhackme rooms & tools☆62Updated 4 years ago
- ☆76Updated 4 years ago
- ☆66Updated 3 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated 2 years ago
- The code and material for my personal open-source website. (Flask, Gunicorn, Certbot)☆79Updated 5 years ago
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆32Updated 2 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆31Updated 5 years ago
- ☆81Updated 5 years ago
- Notes on ECPPT☆22Updated 6 years ago
- ☆48Updated 3 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆26Updated 4 years ago
- ☆28Updated 4 years ago
- Buffer Overflows☆29Updated 4 years ago
- For my Try Hack Me room: Intro To Pwntools☆27Updated 3 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- Generate common Reverse Shells for Pentesting☆41Updated 3 years ago