NullArray / MS-PS-InstallerLinks
Automated PowerShell installer for *Nix with multi Distro support.
☆20Updated 7 years ago
Alternatives and similar repositories for MS-PS-Installer
Users that are interested in MS-PS-Installer are comparing it to the libraries listed below
Sorting:
- One-off scripts☆52Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- PowerShellUtilities provides various utility commandlets.☆51Updated 5 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- ☆51Updated 11 years ago
- Small, one-off scripts for security related stuff I've written over time☆37Updated 9 months ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- ANWI - All New Wireless IDS☆28Updated last month
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆55Updated 6 years ago
- An ARP Poisoning Defender script☆42Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- Word 2016 vulnerability allows injecting HTML/JS code into a docx file's embeddedHTML="" tags.☆96Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 8 years ago
- Powershell MS Outlook enumeration and phishing tool☆77Updated 9 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆81Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 9 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 3 years ago
- ☆81Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Updated 6 years ago
- Search bing with python☆12Updated 11 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Updated 2 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- Oracle Database 12c password brute forcer☆29Updated 10 years ago