bongtrop / psgen
psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., reverse-shell, download-file, runas) to copyable text format.
☆18Updated 4 years ago
Alternatives and similar repositories for psgen:
Users that are interested in psgen are comparing it to the libraries listed below
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Burp suite Certificate modification tool☆18Updated last year
- Python script that automate the process of generating various reverse shells.☆16Updated 4 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- ShellC0de Generator☆11Updated 3 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Yet another powerful payload encoder/decoder☆14Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆18Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Noob Penetration tester☆11Updated 10 months ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- ☆16Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆22Updated 3 years ago
- Python tool for vulnerability assessment and persistence.☆9Updated 4 years ago
- Looto - muilti-thread port scanner with powerful user-friendly GUI. Scan your network to be sure you are safe. This software can use ONLY…☆11Updated 3 years ago
- An exotic service bruteforce tool.☆12Updated 2 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- fully automated c# reverse shells with automated ssh tunneling☆5Updated 4 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- HTTP discovery and change monitoring tool☆12Updated 2 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago