cheetz / nishangLinks
Nishang - PowerShell for penetration testing and offensive security.
☆14Updated 10 years ago
Alternatives and similar repositories for nishang
Users that are interested in nishang are comparing it to the libraries listed below
Sorting:
- PowerShell Helper Tool☆150Updated 10 years ago
- PowerShell_Popup☆33Updated 11 years ago
- A scanning tool for the ShellShock bash vulnerability☆34Updated 8 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆30Updated 9 years ago
- Fileless web browser information extraction☆221Updated 7 years ago
- Covert Channels for C2 Server☆17Updated 10 years ago
- initial push☆14Updated 11 years ago
- Reddit XSS Gather Tool☆20Updated 10 years ago
- PowerShell Empire Web Interface☆330Updated 2 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Updated 8 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Updated 10 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Updated 9 years ago
- A script to test an RDP host for sticky keys and utilman backdoor.☆262Updated 9 years ago
- Port of eternal blue exploits to powershell☆151Updated 8 years ago
- A web scraper for generating password files based on plain text found☆130Updated 2 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆231Updated 8 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆145Updated 10 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆220Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 6 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Updated 10 years ago
- ☆139Updated 8 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆304Updated 8 years ago
- A PoC WMI backdoor presented at Black Hat 2015☆275Updated 10 years ago
- Meterpreter Scripts that I'm working on☆171Updated 7 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆319Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Updated 7 years ago
- Active Directory enumeration from non-domain system.☆118Updated 9 years ago
- An automated SMB relay exploitation script.☆153Updated 9 years ago
- ☆121Updated 10 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆409Updated 9 years ago