PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and Bing searches. It then allows for the download of those files from the target domain. After retrieving the files, the metadata associated with them can be analyzed by PowerMeta. Some interesting things commonl…
☆573Jul 3, 2025Updated 7 months ago
Alternatives and similar repositories for PowerMeta
Users that are interested in PowerMeta are comparing it to the libraries listed below
Sorting:
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆463Oct 3, 2017Updated 8 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,213Aug 7, 2025Updated 6 months ago
- A PowerShell tool for taking screenshots of multiple web servers quickly.☆94Apr 19, 2017Updated 8 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,309Nov 22, 2022Updated 3 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,380May 22, 2020Updated 5 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,077Mar 19, 2024Updated last year
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- HTA encryption tool for RedTeams☆1,424Nov 9, 2022Updated 3 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆2,022Jul 11, 2024Updated last year
- Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain name…☆1,644Jun 6, 2024Updated last year
- PowerShell Pass The Hash Utils☆1,722Dec 9, 2018Updated 7 years ago
- Chameleon: A tool for evading Proxy categorisation☆514Nov 28, 2024Updated last year
- Domain Password Audit Tool for Pentesters☆1,024Dec 24, 2025Updated 2 months ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Apr 14, 2023Updated 2 years ago
- Powershell VNC injector☆341Jun 29, 2020Updated 5 years ago
- Password spraying using AWS Lambda for IP rotation☆657Feb 14, 2023Updated 3 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Sep 22, 2016Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆842Jun 25, 2024Updated last year
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Random Tools☆850Oct 20, 2022Updated 3 years ago
- A script for advanced discovery of Privileged Accounts - includes Shadow Admins☆825Sep 9, 2019Updated 6 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆853Mar 23, 2018Updated 7 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Powershell-based Windows Security Auditing Toolbox☆573Jan 9, 2019Updated 7 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,556Oct 17, 2022Updated 3 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆444Nov 30, 2023Updated 2 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- A tool to abuse Exchange services☆2,300Jun 10, 2024Updated last year
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago