☆21May 14, 2017Updated 8 years ago
Alternatives and similar repositories for PowerStripper
Users that are interested in PowerStripper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Identify Azure blobs using a wordlist of account name and container name strings☆45Mar 13, 2025Updated last year
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- ☆140Dec 31, 2019Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated last year
- Scripts to automate standing up hosts in Linode☆15Feb 16, 2021Updated 5 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- Scripts used in our HackWest Pros vs Joes event☆14Mar 26, 2018Updated 7 years ago
- ☆57May 13, 2020Updated 5 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆463Oct 3, 2017Updated 8 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- The only graphql wordlists you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.☆13Aug 18, 2023Updated 2 years ago
- Get your APT on using social media as a tool for data exfiltration.☆149Dec 8, 2022Updated 3 years ago
- A small collection of scripts that are useful for implementing Domain Fronting in an assessment.☆14Apr 25, 2019Updated 6 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Jan 29, 2022Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- ☆24Feb 14, 2024Updated 2 years ago
- A repository of Labs and other information for learning how PowerShell can help with infosec☆17Nov 3, 2015Updated 10 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- A BACnet layer for Scapy☆13Nov 25, 2015Updated 10 years ago
- This repository contains tools used by 401trg.☆20Apr 14, 2021Updated 4 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Sep 18, 2016Updated 9 years ago
- ☆14Jan 2, 2025Updated last year
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- ☆12Nov 22, 2016Updated 9 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Mar 1, 2020Updated 6 years ago
- My little birds are everywhere. Even in the North. They whisper to me, the strangest stories☆23May 22, 2023Updated 2 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32May 15, 2015Updated 10 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Liniaal - A communication extension to Ruler☆99Aug 22, 2018Updated 7 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Turn Ducky Scripts into QMK ready SEND_STRING() macros☆19Nov 14, 2019Updated 6 years ago
- ☆27Aug 5, 2019Updated 6 years ago