☆311Dec 17, 2018Updated 7 years ago
Alternatives and similar repositories for PowerLine
Users that are interested in PowerLine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Process Injection☆769Oct 24, 2021Updated 4 years ago
- PowerShell rebuilt in C# for Red Teaming purposes☆1,054Feb 27, 2026Updated last month
- Run PowerShell with rundll32. Bypass software restrictions.☆1,821Mar 17, 2021Updated 5 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,335Dec 6, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- Tool that automates Active Directory enumeration☆89Apr 24, 2021Updated 4 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆851Mar 23, 2018Updated 8 years ago
- Payload Generation Framework☆1,973Aug 21, 2024Updated last year
- ☆350Feb 21, 2022Updated 4 years ago
- Also known by Microsoft as Knifecoat☆1,150Dec 22, 2022Updated 3 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,865Aug 12, 2021Updated 4 years ago
- ☆281Dec 30, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆331Oct 20, 2019Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆278Jan 13, 2020Updated 6 years ago
- Create a minidump of the LSASS process from memory☆261Nov 2, 2022Updated 3 years ago
- PowerShell Pass The Hash Utils☆1,745Dec 9, 2018Updated 7 years ago
- DLL Generator for side loading attack☆175Feb 5, 2019Updated 7 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,319Dec 15, 2020Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Aug 28, 2022Updated 3 years ago
- Aggressor scripts for Cobalt Strike☆62Dec 9, 2019Updated 6 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆541Sep 18, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- .NET Project for Attacking vCenter☆557Nov 11, 2021Updated 4 years ago
- ☆1,531Aug 11, 2023Updated 2 years ago
- Run Rubeus via Rundll32☆208Apr 25, 2020Updated 5 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,549Aug 2, 2019Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,937Nov 19, 2025Updated 4 months ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆872Mar 20, 2023Updated 3 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,651Oct 11, 2018Updated 7 years ago
- ☆361Apr 24, 2021Updated 4 years ago
- C# implementation of harmj0y's PowerView☆1,090Mar 22, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆464Oct 3, 2017Updated 8 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,907Jan 24, 2024Updated 2 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆845Oct 3, 2021Updated 4 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆523Nov 26, 2022Updated 3 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆702Jul 27, 2020Updated 5 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,581Jan 5, 2021Updated 5 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆170Jun 16, 2022Updated 3 years ago