carlospolop / PowerSploitLinks
PowerSploit - A PowerShell Post-Exploitation Framework
☆11Updated 5 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Simple script to download some missing tools in Kali☆33Updated 5 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- WebHook for Red Team☆25Updated 4 years ago
- pen testing scripts☆12Updated 4 years ago
- Crack your non-rooted android device pin code with 100% guarantee aslong as usb debugging has been enable. Wbruter also has support for p…☆13Updated 6 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Tools and scripts dedicated to Android application security☆52Updated 4 years ago
- Free tools for mobile testing.☆38Updated 3 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 8 years ago
- Automated Mass Exploiter☆11Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 6 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Updated 3 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆15Updated 6 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆13Updated 6 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Updated 8 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Updated 3 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19Updated 5 years ago
- Bypass CloudFlare to find real IP address☆19Updated 7 years ago
- simple script to pwn android phone with physical access☆26Updated 7 years ago
- Scripts related to offensiveosint.io☆23Updated 5 years ago
- Small social engineering tool written in python2☆20Updated last year
- Undetectable Windows Payload Generation☆10Updated 8 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- Ping2death is a ddos to send packet over a user.. Its has a custom amount of packet☆15Updated 4 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15Updated 5 years ago