An List of my Powershell scripts, commands and Blogs for windows Red Teaming.
☆488Mar 29, 2026Updated last month
Alternatives and similar repositories for Powershell-Scripts-for-Hackers-and-Pentesters
Users that are interested in Powershell-Scripts-for-Hackers-and-Pentesters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Commands and Scripts to attack Linux and Servers☆39May 1, 2025Updated last year
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆44Feb 4, 2024Updated 2 years ago
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot☆62Mar 2, 2025Updated last year
- Simple Project that Extracts PE Information.☆22Apr 4, 2025Updated last year
- TP link AC600 Drivers for All Linux distros☆26Mar 16, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆37Aug 7, 2024Updated last year
- ☆27Nov 24, 2024Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,436Apr 28, 2026Updated last week
- Config files for my GitHub profile.☆16Dec 30, 2025Updated 4 months ago
- Shodan Dorks 2023☆244Jan 13, 2025Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,413Updated this week
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- A passive subdomain finder☆335Apr 19, 2023Updated 3 years ago
- The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make th…☆862Jun 27, 2025Updated 10 months ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆325Mar 24, 2026Updated last month
- Command & Control-Framework created for collaboration in python3☆326Aug 7, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆30Jun 26, 2023Updated 2 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆1,717Aug 19, 2022Updated 3 years ago
- Windows Local Privilege Escalation Cookbook☆1,311Feb 5, 2026Updated 3 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Dec 26, 2025Updated 4 months ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,024Jan 7, 2026Updated 3 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,522Jan 26, 2026Updated 3 months ago
- This repo is about Active Directory Advanced Threat Hunting☆648Feb 17, 2025Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆66Jul 1, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆83Jan 8, 2024Updated 2 years ago
- Active Directory Auditing and Enumeration☆530Mar 31, 2026Updated last month
- The Network Execution Tool☆5,487Apr 29, 2026Updated last week
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆118Jul 18, 2023Updated 2 years ago
- Some scripts to abuse kerberos using Powershell☆358Apr 10, 2026Updated 3 weeks ago
- Origin IP scanning utility developed with ChatGPT☆69Jun 21, 2023Updated 2 years ago