deeexcee-io / PowerShell-Reverse-Shell-GeneratorLinks
Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner
☆77Updated last year
Alternatives and similar repositories for PowerShell-Reverse-Shell-Generator
Users that are interested in PowerShell-Reverse-Shell-Generator are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- A collection of Cobalt Strike Aggressor scripts.☆98Updated 3 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆78Updated 2 years ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆157Updated 5 months ago
- Continuous password spraying tool☆189Updated 3 months ago
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆188Updated 10 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆102Updated 7 months ago
- Malicious powershell scripts loader designed to avoid detection.☆50Updated 2 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆130Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆52Updated 5 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆128Updated 5 months ago
- Most Responder's configuration power in your hand.☆51Updated 5 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆116Updated 2 years ago
- Payload Generation Framework☆91Updated last year
- Make everyone in your VLAN ASRep roastable☆198Updated 3 months ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 3 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆175Updated last year
- ☆99Updated 3 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- Certified Red Team Operator (CRTO) Cheatsheet and Checklist☆137Updated last year
- Code dump from PEN-300/OSEP updated 2022☆41Updated 2 years ago
- My Favorite Offensive Security Scripts☆73Updated 2 months ago
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- ☆93Updated 4 years ago
- Crack Everything for CrackMapExec version 6☆20Updated 11 months ago
- ☆103Updated 9 months ago
- ☆70Updated 3 months ago
- AzureAD Pentest☆20Updated 3 years ago
- ☆47Updated 3 years ago