PhrozenIO / PowerBruteLogon
PowerBruteLogon (Ported version of WinBruteLogon in pure PowerShell)
☆124Updated last year
Alternatives and similar repositories for PowerBruteLogon:
Users that are interested in PowerBruteLogon are comparing it to the libraries listed below
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆94Updated 2 months ago
- PowerShell Asynchronous TCP Reverse Shell☆155Updated last year
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Windows offline filesystem hacking tool for Linux☆97Updated 2 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 3 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆157Updated 2 years ago
- RunAsAttached is a program to run a console as another user and keep new console attached to caller console. Support reverse shell mode (…☆76Updated 2 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆80Updated 4 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Some random tools I use for penetration testing☆88Updated 2 weeks ago
- Run Powershell without software restrictions.☆286Updated 3 years ago
- PowerShell Clipboard Data Transfer☆69Updated 8 months ago
- Simple rapper for Mimikatz, bypass Defender☆140Updated 3 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆109Updated last year
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 3 years ago
- This repository provides the core to build your own External C2 Server and Connector for Brute Ratel C4☆52Updated 2 years ago
- Application for administer multidomain Active Directory-based networks☆25Updated 5 months ago
- PowerShell payload generator☆116Updated 3 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆66Updated last year
- Map remote .NET assemblies to memory for further invocation.☆41Updated 3 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆108Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆316Updated 2 years ago
- Microsoft Signed PowerShell scripts☆213Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆38Updated 4 years ago
- A WLAN red team framework.☆152Updated 6 months ago
- RDP Checker☆63Updated last year
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago