Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!
☆13Apr 19, 2020Updated 5 years ago
Alternatives and similar repositories for PowershellAdmin
Users that are interested in PowershellAdmin are comparing it to the libraries listed below
Sorting:
- Pwnage☆17Jul 1, 2025Updated 7 months ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Aug 9, 2022Updated 3 years ago
- Penetration Testing with Kali Linux☆22Oct 18, 2019Updated 6 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- Cura 5.x plugin for including thumbnail/preview images in gcode files for Elegoo Neptune 3 Pro, Plus and Max.☆13May 12, 2023Updated 2 years ago
- RSMP Signal Exchange List (SXL) for Traffic Controllers☆12Dec 19, 2025Updated 2 months ago
- A collection of SolarWinds SWQL examples☆10Mar 18, 2021Updated 4 years ago
- Import Recommended Firewall Rules from vRNI to VMware Cloud on AWS or NSX-T☆10Feb 3, 2022Updated 4 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated 3 weeks ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Source code of https://torstatus.rueckgr.at☆10Jan 14, 2026Updated last month
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- Modeling, analyzing and rendering attack trees.☆11Sep 9, 2021Updated 4 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Let's Snatch The Admin Panel Of Any Website In Seconds.☆17Feb 24, 2020Updated 6 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- RunAsAttached is a program to locally run a new terminal as another user without spawning a new console window.☆47Jan 27, 2022Updated 4 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- to show all hidden EFIs and any APFS subvolumes☆11Jul 5, 2021Updated 4 years ago
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Microsoft Azure scripts☆14Dec 29, 2024Updated last year
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- ALL IN ONE Hacking Tool For Hackers☆10Dec 12, 2020Updated 5 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Automate scans using Qualys SSL Labs☆19Mar 10, 2020Updated 5 years ago
- Python scripts to control and read status of Yamaha SR-C20A soundbar with web and MQTT interfaces.☆10Jan 29, 2026Updated last month
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- ☆12Aug 8, 2024Updated last year
- Binary and Static Releases☆16Feb 20, 2026Updated last week
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago