Powershell-Offense / Post-Exploitation
\ PowerAvails Powershell /
☆12Updated 6 years ago
Alternatives and similar repositories for Post-Exploitation:
Users that are interested in Post-Exploitation are comparing it to the libraries listed below
- ☆17Updated 7 years ago
- ☆13Updated 3 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- ☆15Updated 9 years ago
- ☆25Updated 6 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- ☆11Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- Short handy snippets from the @mwrlabs team☆20Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 11 months ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆12Updated 8 years ago
- Cobalt Strike log state tracking, parsing, and storage☆23Updated 5 years ago
- ☆11Updated 6 years ago
- Python crawler for remote Windows shares☆12Updated 9 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- AV Bypass☆29Updated 7 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆12Updated 6 years ago
- Everything related to Cobalt Strike☆15Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 5 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago