☆309Dec 17, 2018Updated 7 years ago
Alternatives and similar repositories for PowerLine
Users that are interested in PowerLine are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21May 14, 2017Updated 8 years ago
- Process Injection☆767Oct 24, 2021Updated 4 years ago
- PowerShell rebuilt in C# for Red Teaming purposes☆1,057Feb 27, 2026Updated 2 months ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,821Mar 17, 2021Updated 5 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,338Dec 6, 2023Updated 2 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Feb 10, 2021Updated 5 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆288Aug 7, 2020Updated 5 years ago
- Tool that automates Active Directory enumeration☆89Apr 24, 2021Updated 5 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆851Mar 23, 2018Updated 8 years ago
- Payload Generation Framework☆1,979Aug 21, 2024Updated last year
- ☆350Feb 21, 2022Updated 4 years ago
- Also known by Microsoft as Knifecoat☆1,148Dec 22, 2022Updated 3 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,868Aug 12, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆281Dec 30, 2020Updated 5 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆332Oct 20, 2019Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆278Jan 13, 2020Updated 6 years ago
- Create a minidump of the LSASS process from memory☆260Nov 2, 2022Updated 3 years ago
- PowerShell Pass The Hash Utils☆1,756Dec 9, 2018Updated 7 years ago
- DLL Generator for side loading attack☆174Feb 5, 2019Updated 7 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,321Dec 15, 2020Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆814Aug 28, 2022Updated 3 years ago
- Aggressor scripts for Cobalt Strike☆62Dec 9, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆543Sep 18, 2022Updated 3 years ago
- ☆1,529Aug 11, 2023Updated 2 years ago
- .NET Project for Attacking vCenter☆559Nov 11, 2021Updated 4 years ago
- Run Rubeus via Rundll32☆211Apr 25, 2020Updated 6 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,550Aug 2, 2019Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,956Nov 19, 2025Updated 5 months ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆874Mar 20, 2023Updated 3 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,656Oct 11, 2018Updated 7 years ago
- ☆361Apr 24, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- C# implementation of harmj0y's PowerView☆1,094Mar 22, 2024Updated 2 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆466Oct 3, 2017Updated 8 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,910Jan 24, 2024Updated 2 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆845Oct 3, 2021Updated 4 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆523Nov 26, 2022Updated 3 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆702Jul 27, 2020Updated 5 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,582Jan 5, 2021Updated 5 years ago