carlospolop / PowerSploitLinks
PowerSploit - A PowerShell Post-Exploitation Framework
☆11Updated 4 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 3 years ago
- Tutorials for getting started with Pwntools☆12Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 3 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆14Updated 2 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆14Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 6 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Scripts related to offensiveosint.io☆23Updated 5 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆14Updated 2 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Repository of tools used in my blog☆51Updated last year
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆17Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆11Updated 5 years ago