PowerSploit - A PowerShell Post-Exploitation Framework
☆11Aug 17, 2020Updated 5 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Jun 20, 2022Updated 3 years ago
- ☆28Sep 16, 2020Updated 5 years ago
- Windows Keylogger in C++☆19Nov 2, 2022Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- Simple script to download some missing tools in Kali☆33Nov 28, 2020Updated 5 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆14Nov 29, 2023Updated 2 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- steal password mozilla firefox ,windows,Linux☆10Oct 12, 2020Updated 5 years ago
- Online plugins used by VirtualXposed☆22Nov 24, 2020Updated 5 years ago
- ☆29Mar 2, 2023Updated 3 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Simple way to read wirte delete values from registry☆18Jun 24, 2019Updated 6 years ago
- Command line text processing with Rust tools☆20May 14, 2022Updated 3 years ago
- wh cyberspace☆12Oct 1, 2022Updated 3 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- https://github.com/infosecn1nja/AD-Attack-Defense☆16Jan 22, 2022Updated 4 years ago
- https-server for Termux ( Node.js )☆16Jul 10, 2018Updated 7 years ago
- this is the repo for all my code for the soda machine, -- mind the mess!☆16Aug 31, 2022Updated 3 years ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- ☆15Aug 7, 2021Updated 4 years ago
- We are a group of enthusiasts who want an interface to be able to talk to our cars remotely, perhaps add on-car displays (such as heads-u…☆12May 15, 2013Updated 12 years ago
- This Script contains tools like assetfinder, amass, httprobe, subjack, nmap, waybackurls and gowitness☆14Mar 31, 2022Updated 3 years ago
- Sketch to scan OBDII with an M2☆13Aug 1, 2021Updated 4 years ago
- A simple browser protocol which runs commands in your terminal through your browser.☆11Sep 13, 2024Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- ☆26Jun 19, 2022Updated 3 years ago
- Traktor S5 Deck Tweaks☆10Jun 4, 2021Updated 4 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- GMLAN to GM 29 bit car gateway☆16Aug 1, 2017Updated 8 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆30Aug 28, 2023Updated 2 years ago
- Windows privilege escalation with cmd☆90Dec 13, 2021Updated 4 years ago