PowerSploit - A PowerShell Post-Exploitation Framework
☆31Oct 1, 2015Updated 10 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below
Sorting:
- ☆17Oct 5, 2014Updated 11 years ago
- Detecting malicious WiFi with mining cryptocurrency.☆50Mar 16, 2018Updated 7 years ago
- Veil Catapult is no longer supported☆75May 24, 2016Updated 9 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- A tool for identifying missing devices from DeviceManager☆30Jul 19, 2018Updated 7 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Feb 2, 2016Updated 10 years ago
- You'll never take me alive.☆85May 9, 2014Updated 11 years ago
- Packet Sniffing in the Cloud☆35Feb 22, 2026Updated last week
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- mybatis 通用crud,无需继承,直接调用。☆10Apr 25, 2017Updated 8 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- COMMS Software for UPSat☆12Dec 17, 2018Updated 7 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Sourcecode & CAD drawings of NimbRo-OP☆27Oct 30, 2012Updated 13 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- ☆18Oct 10, 2020Updated 5 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- OpenKit Server☆114Jun 9, 2014Updated 11 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- A Git mirror of Redpin indoor positioning code from http://sourceforge.net/p/redpin/☆12Aug 31, 2015Updated 10 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- Set of miscellaneous scripts for personal use.☆14May 18, 2024Updated last year
- ☆10May 30, 2015Updated 10 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- Netwitness Maltego integration Project☆18May 9, 2017Updated 8 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- ☆14Sep 15, 2016Updated 9 years ago