PowerSploit - A PowerShell Post-Exploitation Framework
☆31Oct 1, 2015Updated 10 years ago
Alternatives and similar repositories for PowerSploit
Users that are interested in PowerSploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Oct 5, 2014Updated 11 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- CobaltStrike AggressorScripts for the lazy☆10Jul 22, 2022Updated 3 years ago
- Dockerfiles for containerized osquery☆14May 23, 2017Updated 8 years ago
- Only for research and learning, not for commercial and illegal use☆11Jul 22, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Useful PowerShell scripts☆1,279Oct 30, 2018Updated 7 years ago
- Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau☆19Feb 23, 2016Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated last year
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- OSCP Scripts☆14Jan 21, 2016Updated 10 years ago
- ☆11Apr 28, 2017Updated 9 years ago
- ☆137Mar 29, 2018Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PowerShell script useful for Incident Response and security/configuration baselines for Windows Vista and later☆20Feb 23, 2016Updated 10 years ago
- The decryption implementation of Chrome cookie(encrypted_value) and password(password_value) on Windows with Java☆24Aug 13, 2021Updated 4 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆409Nov 17, 2014Updated 11 years ago
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Aug 13, 2018Updated 7 years ago
- ircollect☆31Aug 7, 2013Updated 12 years ago
- Detecting malicious WiFi with mining cryptocurrency.☆50Mar 16, 2018Updated 8 years ago
- This repository contains all source code of our API's nuget and sample code that shows how to use them.☆22Jun 10, 2025Updated 10 months ago
- ☆28Jun 12, 2017Updated 8 years ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆11Jul 29, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- Dump mailbox folder permissions to CSV file☆13May 24, 2020Updated 5 years ago
- The Horrific Omnipotent Rootkit☆24Mar 17, 2017Updated 9 years ago
- A tool for identifying missing devices from DeviceManager☆30Jul 19, 2018Updated 7 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- ICMP隧道,用于内网渗透工具☆10Mar 13, 2019Updated 7 years ago
- This script runs several security checks and makes modifications (with your permission) to your Active Directory domain to improve it's s…☆45Feb 2, 2016Updated 10 years ago
- Android malware static & dynamic analysis and automated action (deprecated)☆21May 18, 2021Updated 4 years ago
- Veil Catapult is no longer supported☆75May 24, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains some tools that I have written in the past☆29Nov 11, 2023Updated 2 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Aug 23, 2016Updated 9 years ago
- WebShell高效爆破字典生成☆28Mar 30, 2020Updated 6 years ago
- ☆52Apr 14, 2015Updated 11 years ago
- ☆11Mar 9, 2018Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Aug 12, 2015Updated 10 years ago
- ☆128Jun 12, 2015Updated 10 years ago