PowerSploit - A PowerShell Post-Exploitation Framework
☆31Oct 1, 2015Updated 10 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Oct 5, 2014Updated 11 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- Miscellaneous projects related to attacking Windows.☆198Nov 2, 2014Updated 11 years ago
- CobaltStrike AggressorScripts for the lazy☆10Jul 22, 2022Updated 3 years ago
- Dockerfiles for containerized osquery☆14May 23, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Only for research and learning, not for commercial and illegal use☆11Jul 22, 2019Updated 6 years ago
- Useful PowerShell scripts☆1,281Oct 30, 2018Updated 7 years ago
- ☆14Jun 27, 2017Updated 8 years ago
- A simple fanotify example for watching events on a filesystem.☆13Sep 19, 2015Updated 10 years ago
- python ShellCode Loader (Cobaltstrike&Metasploit)☆20Nov 28, 2019Updated 6 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 11 months ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Feb 16, 2014Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- AggressorScript-UploadAndRunFrp/上传frpc并且运行frpc☆63Sep 1, 2019Updated 6 years ago
- ☆11Apr 28, 2017Updated 8 years ago
- ☆137Mar 29, 2018Updated 8 years ago
- PowerShell script useful for Incident Response and security/configuration baselines for Windows Vista and later☆20Feb 23, 2016Updated 10 years ago
- The decryption implementation of Chrome cookie(encrypted_value) and password(password_value) on Windows with Java☆24Aug 13, 2021Updated 4 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆408Nov 17, 2014Updated 11 years ago
- ircollect☆31Aug 7, 2013Updated 12 years ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- Infrastructure as Code (IaC) repository for deploying and managing Azure resources using Bicep. It also includes examples of working with…☆20Mar 1, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Detecting malicious WiFi with mining cryptocurrency.☆50Mar 16, 2018Updated 8 years ago
- This repository contains all source code of our API's nuget and sample code that shows how to use them.☆22Jun 10, 2025Updated 10 months ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- Dump mailbox folder permissions to CSV file☆13May 24, 2020Updated 5 years ago
- The Horrific Omnipotent Rootkit☆24Mar 17, 2017Updated 9 years ago
- A tool for identifying missing devices from DeviceManager☆30Jul 19, 2018Updated 7 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Feb 2, 2016Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A project to help share common scripts in the PowerActions web client fling☆11Jul 26, 2015Updated 10 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- Veil Catapult is no longer supported☆75May 24, 2016Updated 9 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- WebShell高效爆破字典生成☆28Mar 30, 2020Updated 6 years ago
- ☆52Apr 14, 2015Updated 11 years ago
- ☆11Mar 9, 2018Updated 8 years ago