A framework for PowerShell and PoshSec scripts for network management, security, and maintenance.
☆144Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for PoshSecFramework
Users that are interested in PoshSecFramework are comparing it to the libraries listed below
Sorting:
- PowerShell scripts for the PoshSec Framework☆22Aug 18, 2014Updated 11 years ago
- PoshSec PowerShell Module☆160May 27, 2018Updated 7 years ago
- PowerShell Module with Security cmdlets for security work☆448Feb 27, 2020Updated 6 years ago
- Windows PowerShell domain scanning tool☆54Apr 23, 2016Updated 9 years ago
- ☆110May 14, 2018Updated 7 years ago
- A Powershell incident response framework☆1,640Nov 22, 2022Updated 3 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,546Aug 2, 2019Updated 6 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,427Nov 16, 2023Updated 2 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆869Aug 4, 2017Updated 8 years ago
- A portable console aimed at making pentesting with PowerShell a little easier.☆48Apr 4, 2017Updated 8 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆893Aug 20, 2021Updated 4 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆493Jul 29, 2017Updated 8 years ago
- ☆80Sep 27, 2015Updated 10 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆388Jun 25, 2024Updated last year
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Dec 9, 2015Updated 10 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Mar 5, 2016Updated 9 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆658Aug 19, 2019Updated 6 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆143Aug 9, 2015Updated 10 years ago
- ☆424Aug 29, 2017Updated 8 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Mar 10, 2020Updated 5 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- Exploit the credentials present in files and memory☆843May 25, 2023Updated 2 years ago
- Collection of ISE Menu Add-Ons that I have written☆12Jul 20, 2016Updated 9 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- PowerShell script to find 'vulnerable' security-related GPOs that should be hardended☆198Jun 1, 2018Updated 7 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆168Jan 15, 2019Updated 7 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,813Jan 19, 2020Updated 6 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,864Jun 28, 2024Updated last year
- Check for valid credentials across a network over SMB☆267Jan 5, 2024Updated 2 years ago