PowerSploit - A PowerShell Post-Exploitation Framework
☆239Jan 26, 2022Updated 4 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Mar 25, 2025Updated 11 months ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆879Mar 29, 2021Updated 4 years ago
- C# implementation of harmj0y's PowerView☆1,092Mar 22, 2024Updated last year
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆424Jul 27, 2022Updated 3 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆842Oct 3, 2021Updated 4 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆258May 12, 2020Updated 5 years ago
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆118Sep 29, 2020Updated 5 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆840Dec 2, 2023Updated 2 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆935Nov 11, 2024Updated last year
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Aug 4, 2021Updated 4 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆125May 24, 2022Updated 3 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆931Jul 26, 2021Updated 4 years ago
- The Hunt for Malicious Strings☆1,368May 13, 2025Updated 10 months ago
- NTLM relaying for Windows made easy☆581Apr 25, 2023Updated 2 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,097Apr 19, 2023Updated 2 years ago
- ☆1,674Apr 14, 2025Updated 11 months ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆837Oct 29, 2025Updated 4 months ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,805Updated this week
- ☆418Apr 28, 2021Updated 4 years ago
- Framework for Kerberos relaying☆938May 29, 2022Updated 3 years ago
- The swiss army knife of LSASS dumping☆2,081Sep 17, 2024Updated last year
- Remote operations commands implemented using Beacon Object Files☆1,139Mar 5, 2026Updated 2 weeks ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,162Mar 31, 2021Updated 4 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆275May 3, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,372Oct 27, 2023Updated 2 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆772Sep 4, 2024Updated last year
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- ☆832Sep 9, 2022Updated 3 years ago
- Collection of beacon BOF written to learn windows and cobaltstrike☆362Feb 24, 2023Updated 3 years ago
- ☆667Nov 17, 2021Updated 4 years ago
- A C# utility for interacting with SCCM☆683Aug 20, 2025Updated 7 months ago
- Dump the memory of a PPL with a userland exploit☆888Jul 24, 2022Updated 3 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- A (partial) Python rewriting of PowerSploit's PowerView☆1,105Mar 5, 2026Updated 2 weeks ago
- ☆361Apr 24, 2021Updated 4 years ago
- .NET Project for Attacking vCenter☆553Nov 11, 2021Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆430Jul 22, 2022Updated 3 years ago