PowerSploit - A PowerShell Post-Exploitation Framework
☆14Aug 17, 2020Updated 5 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Mar 27, 2020Updated 6 years ago
- CTFs as you need them☆30May 3, 2023Updated 3 years ago
- A stream implementation for Python that provides transparent base64 encoding and decoding of an underlying stream.☆17Feb 17, 2023Updated 3 years ago
- Compress a Python script to a command-line one-liner☆78Dec 31, 2022Updated 3 years ago
- ☆22Dec 24, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- These are notes and code from my experience working through the UnderTheWire wargames.☆27Sep 28, 2020Updated 5 years ago
- The official StrawPoll API v3☆13Oct 8, 2023Updated 2 years ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆150Jul 21, 2022Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- Go bindings for Carina™☆13Feb 6, 2017Updated 9 years ago
- Python based Discord bot Which allows you to run tools like nmap and amass from discord☆28Oct 23, 2022Updated 3 years ago
- Algorithms of facial recognition through sketches☆13May 9, 2014Updated 12 years ago
- This is an instagram clone project developed using DJANGO2.22 Framework and Bootstrap 4, to replicate Original Instagram with the aim of …☆10Oct 4, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago
- dot.files - shell stuff☆19Apr 18, 2026Updated last month
- ☆12May 4, 2021Updated 5 years ago
- The C Programming Language Book by Brian W. Kernighan and Dennis M. Ritchie - solved exercises☆16Apr 26, 2022Updated 4 years ago
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 7 years ago
- ☆13Jul 16, 2021Updated 4 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Tools to work with the Anki Vector robot☆11Nov 21, 2020Updated 5 years ago
- A communal outpouring of online resources for learning different things in cybersecurity☆478Sep 19, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆199Aug 9, 2022Updated 3 years ago
- The great opencd tool compiled for Windows with Bus Pirate support☆15Nov 24, 2017Updated 8 years ago
- AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!☆15Jan 11, 2020Updated 6 years ago
- ☆22Aug 28, 2025Updated 8 months ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 6 years ago
- 🙃 Reverse Shell Cheat Sheet 🙃☆13Mar 11, 2019Updated 7 years ago
- ☆10Oct 9, 2024Updated last year
- sqlmap tamper script for unicode escape inside json☆14Dec 20, 2018Updated 7 years ago
- Information and build status for SubgraphOS Debian packages☆19Nov 23, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13Sep 20, 2021Updated 4 years ago
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- Research into potential vulnerabilities and risks of auto-generated pseudorandom passwords + Bluetooth Exploit.☆22Oct 24, 2018Updated 7 years ago
- A tool for sorting blocks of lines☆36Oct 4, 2022Updated 3 years ago
- Tool to start a python http server in a simple way☆11Mar 30, 2022Updated 4 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Apr 24, 2026Updated 3 weeks ago
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆128Jul 16, 2022Updated 3 years ago