carlospolop / PowerSploitLinks
PowerSploit - A PowerShell Post-Exploitation Framework
☆11Updated 5 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Simple script to download some missing tools in Kali☆33Updated 5 years ago
- Miscellaneous tools for BloodHound☆18Updated 4 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 7 years ago
- Tools and scripts dedicated to Android application security☆52Updated 4 years ago
- Free tools for mobile testing.☆39Updated 3 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Updated 8 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Updated 4 years ago
- WebHook for Red Team☆25Updated 4 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Updated 7 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- pen testing scripts☆12Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 6 years ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19Updated 5 years ago
- Automated Mass Exploiter☆11Updated 6 years ago
- Simple script for the WHID injector - a rubberducky wifi☆116Updated last year
- Selenium based bot that automatize the creation of accounts in a web page☆14Updated 3 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 8 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆15Updated 6 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆16Updated 2 years ago
- Recon Automation☆11Updated last year
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆40Updated 6 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆30Updated 6 years ago
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Updated 5 years ago
- Fast subdomains enumeration tool for penetration testers☆14Updated 6 years ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Updated 2 months ago