PowerSploit - A PowerShell Post-Exploitation Framework
☆238Jan 26, 2022Updated 4 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated 11 months ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆879Mar 29, 2021Updated 4 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆425Jul 27, 2022Updated 3 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆838Oct 3, 2021Updated 4 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆931Nov 11, 2024Updated last year
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆839Dec 2, 2023Updated 2 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆125May 24, 2022Updated 3 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,097Apr 19, 2023Updated 2 years ago
- Framework for Kerberos relaying☆937May 29, 2022Updated 3 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆928Jul 26, 2021Updated 4 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆183Aug 4, 2021Updated 4 years ago
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆118Sep 29, 2020Updated 5 years ago
- Remote operations commands implemented using Beacon Object Files☆1,120Updated this week
- ☆1,669Apr 14, 2025Updated 10 months ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- C# implementation of harmj0y's PowerView☆1,086Mar 22, 2024Updated last year
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆836Oct 29, 2025Updated 3 months ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,779Feb 18, 2026Updated last week
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,367Oct 27, 2023Updated 2 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- Check for LDAP protections regarding the relay of NTLM authentication☆531Nov 19, 2024Updated last year
- ☆829Sep 9, 2022Updated 3 years ago
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- A C# utility for interacting with SCCM☆682Aug 20, 2025Updated 6 months ago
- ☆360Apr 24, 2021Updated 4 years ago
- ☆415Apr 28, 2021Updated 4 years ago
- The Hunt for Malicious Strings☆1,363May 13, 2025Updated 9 months ago
- "Golden" certificates☆709Aug 17, 2024Updated last year
- The swiss army knife of LSASS dumping☆2,072Sep 17, 2024Updated last year
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆275May 3, 2023Updated 2 years ago
- Situational Awareness commands implemented using Beacon Object Files☆1,722Updated this week
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆429Jul 22, 2022Updated 3 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆771Sep 4, 2024Updated last year
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Mar 31, 2021Updated 4 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,051Jan 22, 2026Updated last month
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆257May 12, 2020Updated 5 years ago