Whitecat18 / Powershell-Scripts-for-Hackers-and-Pentesters
An List of my Powershell scripts, commands and Blogs for windows Red Teaming.
☆415Updated 2 months ago
Alternatives and similar repositories for Powershell-Scripts-for-Hackers-and-Pentesters:
Users that are interested in Powershell-Scripts-for-Hackers-and-Pentesters are comparing it to the libraries listed below
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆989Updated 9 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆561Updated 6 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆415Updated last month
- Technical notes, AD pentest methodology, list of tools, scripts and Windows commands that I find useful during internal penetration tests…☆267Updated last week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆375Updated 6 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆736Updated 3 weeks ago
- Windows Local Privilege Escalation Cookbook☆1,096Updated 3 months ago
- Active Directory Auditing and Enumeration☆448Updated 2 weeks ago
- PowerShell Ransomware Simulator with C2 Server☆478Updated last year
- A RedTeam Toolkit☆395Updated 3 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆368Updated 2 months ago
- This is for Ethical Use only.☆327Updated 3 weeks ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆206Updated 5 months ago
- Script for generating revshells☆468Updated 7 months ago
- Repo containing cracked red teaming tools.☆166Updated last month
- EDR & Antivirus Bypass to Gain Shell Access☆236Updated 6 months ago
- ☆342Updated 2 years ago
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆222Updated 2 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆475Updated last year
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆35Updated last year
- Simple & Powerful PowerShell Script Obfuscator☆559Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆117Updated 8 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆580Updated 9 months ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆750Updated 3 weeks ago
- ☆121Updated last year
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆569Updated 6 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆292Updated 10 months ago
- ☆454Updated last week
- ☆704Updated 2 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆510Updated 8 months ago