PowerSploit - A PowerShell Post-Exploitation Framework
☆14Aug 17, 2020Updated 5 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Jan 24, 2017Updated 9 years ago
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Mar 27, 2020Updated 6 years ago
- CTFs as you need them☆30May 3, 2023Updated 2 years ago
- A stream implementation for Python that provides transparent base64 encoding and decoding of an underlying stream.☆17Feb 17, 2023Updated 3 years ago
- This is a clone of the of Introduction To Linux repo that I developed for the class I taught at the US Coast Guard Academy.☆65Aug 26, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆22Dec 24, 2021Updated 4 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- The teaching vessel and "interactive textbook" that I am building for the Intro to Linux class at the USCGA.☆26Apr 26, 2024Updated 2 years ago
- Ansible playbooks to install various utility and security tools to localhost☆29Aug 5, 2019Updated 6 years ago
- The official StrawPoll API v3☆13Oct 8, 2023Updated 2 years ago
- This is a small BASH script to quickly setup all the tools I would want and need on a new machine.☆150Jul 21, 2022Updated 3 years ago
- ☆19Apr 16, 2026Updated 2 weeks ago
- Create machine images containing the Nessus vulnerability scanner☆13Apr 24, 2026Updated last week
- ☆11Jan 7, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆12Dec 30, 2020Updated 5 years ago
- This is an instagram clone project developed using DJANGO2.22 Framework and Bootstrap 4, to replicate Original Instagram with the aim of …☆10Oct 4, 2023Updated 2 years ago
- Detect and extract the static part of a glob string.☆10Mar 22, 2022Updated 4 years ago
- dot.files - shell stuff☆19Apr 18, 2026Updated last week
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 7 years ago
- ☆12Jul 16, 2021Updated 4 years ago
- Tools to work with the Anki Vector robot☆11Nov 21, 2020Updated 5 years ago
- A communal outpouring of online resources for learning different things in cybersecurity☆476Sep 19, 2021Updated 4 years ago
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆199Aug 9, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Curated list of Unix binaries that can be exploited to bypass system security restrictions☆35Apr 5, 2023Updated 3 years ago
- ☆22Aug 28, 2025Updated 8 months ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 6 years ago
- 🙃 Reverse Shell Cheat Sheet 🙃☆13Mar 11, 2019Updated 7 years ago
- sqlmap tamper script for unicode escape inside json☆14Dec 20, 2018Updated 7 years ago
- ☆10Oct 9, 2024Updated last year
- Internal Network Penetration Test Playbook☆20Jul 13, 2021Updated 4 years ago
- ☆13Sep 20, 2021Updated 4 years ago
- Research into potential vulnerabilities and risks of auto-generated pseudorandom passwords + Bluetooth Exploit.☆22Oct 24, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A tool for sorting blocks of lines☆36Oct 4, 2022Updated 3 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 4 years ago
- Archive of pentestmonkey.net cheat sheets in case the site goes away permanently☆13Oct 28, 2019Updated 6 years ago
- A list of resources for those interested in getting started in bug bounties☆15Jan 15, 2019Updated 7 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Apr 24, 2026Updated last week
- Notes and resources for the Active Directory YouTube series on https://youtube.com/JohnHammond010☆128Jul 16, 2022Updated 3 years ago
- Local CLI tool that lets you write natural language instructions and get the corresponding shell commands generated by a small language m…☆21Nov 18, 2025Updated 5 months ago