☆21May 14, 2017Updated 8 years ago
Alternatives and similar repositories for PowerStripper
Users that are interested in PowerStripper are comparing it to the libraries listed below
Sorting:
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- ☆310Dec 17, 2018Updated 7 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- Collections of past presentation slides☆15Feb 18, 2022Updated 4 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆45Mar 13, 2025Updated 11 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- A repository of Labs and other information for learning how PowerShell can help with infosec☆17Nov 3, 2015Updated 10 years ago
- ☆57May 13, 2020Updated 5 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32May 15, 2015Updated 10 years ago
- ☆26Apr 30, 2020Updated 5 years ago
- ☆30Jul 8, 2020Updated 5 years ago
- Rethinking the User Interface of AI☆32Updated this week
- ☆33Apr 20, 2022Updated 3 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- ☆140Dec 31, 2019Updated 6 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Jan 29, 2022Updated 4 years ago
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- This is an initiative to port the letsencrypt functionality to Windows via PowerShell☆37Nov 4, 2016Updated 9 years ago
- ☆30Aug 22, 2019Updated 6 years ago
- A PowerShell module with functions to help calculate working hours, and for generally working with or calculating business hours / date t…☆11Oct 5, 2022Updated 3 years ago
- ☆13Nov 5, 2024Updated last year
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Sep 19, 2017Updated 8 years ago
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆463Oct 3, 2017Updated 8 years ago
- ☆19Jan 15, 2026Updated last month
- Powershell modules to provide utility functions for day-to-day problems in .NET web development.☆11Nov 3, 2016Updated 9 years ago
- ☆16May 13, 2021Updated 4 years ago
- Automatically create safes and permission with role groups based on your enterprise standards and policies☆12Jul 31, 2018Updated 7 years ago