An List of my Powershell scripts, commands and Blogs for windows Red Teaming.
☆486Feb 23, 2025Updated last year
Alternatives and similar repositories for Powershell-Scripts-for-Hackers-and-Pentesters
Users that are interested in Powershell-Scripts-for-Hackers-and-Pentesters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Commands and Scripts to attack Linux and Servers☆38May 1, 2025Updated 10 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆45Feb 4, 2024Updated 2 years ago
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot☆59Mar 2, 2025Updated last year
- Simple Project that Extracts PE Information.☆22Apr 4, 2025Updated 11 months ago
- TP link AC600 Drivers for All Linux distros☆24Mar 16, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆37Aug 7, 2024Updated last year
- ☆27Nov 24, 2024Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,342Mar 4, 2026Updated 3 weeks ago
- Shodan Dorks 2023☆245Jan 13, 2025Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,153Jul 19, 2024Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,318Updated this week
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make th…☆847Jun 27, 2025Updated 9 months ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆321Updated this week
- Command & Control-Framework created for collaboration in python3☆323Aug 7, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆30Jun 26, 2023Updated 2 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆785Jun 23, 2023Updated 2 years ago
- ☆1,706Aug 19, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Windows Local Privilege Escalation Cookbook☆1,287Feb 5, 2026Updated last month
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 3 months ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,013Jan 7, 2026Updated 2 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,497Jan 26, 2026Updated 2 months ago
- This repo is about Active Directory Advanced Threat Hunting☆650Feb 17, 2025Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆66Jul 1, 2024Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Active Directory Auditing and Enumeration☆521Dec 3, 2025Updated 3 months ago
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- The Network Execution Tool☆5,356Mar 20, 2026Updated last week
- Some scripts to abuse kerberos using Powershell☆355Jul 27, 2023Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆116Jul 18, 2023Updated 2 years ago
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago