byt3bl33d3r / PowerSploitLinks
PowerSploit - A PowerShell Post-Exploitation Framework
☆18Updated 5 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆11Updated 7 years ago
- SMBMap is a handy SMB enumeration tool☆38Updated last year
- Red Team Tool Kit☆16Updated 6 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆55Updated 6 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆78Updated 7 years ago
- Trying to take the dum-dum out of security☆12Updated 8 years ago
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- ☆53Updated 4 years ago
- Modern problems require modern solutions☆32Updated 2 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆31Updated 8 years ago
- pen testing scripts☆12Updated 4 years ago
- An advanced reverse shell written in Python3.☆22Updated 4 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆114Updated 4 years ago
- mosquito - Automating reconnaissance and brute force attacks☆132Updated 5 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆61Updated 4 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆27Updated 4 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Transform your batch (bat) script into one binary.exe☆51Updated last year
- Simple Karma Attack☆69Updated 5 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆85Updated 4 years ago
- ☆19Updated 8 years ago