An List of my Powershell scripts, commands and Blogs for windows Red Teaming.
☆488Mar 29, 2026Updated 2 weeks ago
Alternatives and similar repositories for Powershell-Scripts-for-Hackers-and-Pentesters
Users that are interested in Powershell-Scripts-for-Hackers-and-Pentesters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Commands and Scripts to attack Linux and Servers☆39May 1, 2025Updated 11 months ago
- Simple Project that Extracts PE Information.☆22Apr 4, 2025Updated last year
- TP link AC600 Drivers for All Linux distros☆24Mar 16, 2024Updated 2 years ago
- ☆27Nov 24, 2024Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,375Mar 4, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Shodan Dorks 2023☆245Jan 13, 2025Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,168Jul 19, 2024Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,378Updated this week
- Escalate Service Account To LocalSystem via Kerberos☆404Sep 14, 2023Updated 2 years ago
- A passive subdomain finder☆335Apr 19, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make th…☆856Jun 27, 2025Updated 9 months ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆325Mar 24, 2026Updated 3 weeks ago
- Command & Control-Framework created for collaboration in python3☆324Aug 7, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆30Jun 26, 2023Updated 2 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- ☆1,718Aug 19, 2022Updated 3 years ago
- Windows Local Privilege Escalation Cookbook☆1,300Feb 5, 2026Updated 2 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,018Jan 7, 2026Updated 3 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,514Jan 26, 2026Updated 2 months ago
- This repo is about Active Directory Advanced Threat Hunting☆650Feb 17, 2025Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆66Jul 1, 2024Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Active Directory Auditing and Enumeration☆525Mar 31, 2026Updated 2 weeks ago
- Some scripts to abuse kerberos using Powershell☆356Updated this week
- The Network Execution Tool☆5,407Apr 6, 2026Updated last week
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Jul 18, 2023Updated 2 years ago
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆67Aug 31, 2024Updated last year
- ☆14Mar 20, 2025Updated last year