A repository of Labs and other information for learning how PowerShell can help with infosec
☆17Nov 3, 2015Updated 10 years ago
Alternatives and similar repositories for InfosecPosh101
Users that are interested in InfosecPosh101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- ☆20Jan 5, 2024Updated 2 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Jan 25, 2017Updated 9 years ago
- ☆40Jan 10, 2020Updated 6 years ago
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆13Feb 18, 2024Updated 2 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Sep 22, 2017Updated 8 years ago
- Data Brokers Information and Out-Out Links☆17Apr 12, 2024Updated 2 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- Recon scripts for Red Team and Web blackbox auditing☆25Mar 3, 2026Updated last month
- ☆15May 9, 2023Updated 2 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆31May 15, 2015Updated 10 years ago
- ☆21May 14, 2017Updated 8 years ago
- Control your Samsung TV using a serial port☆13May 27, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Threat Mitigation Strategies☆29Feb 18, 2026Updated 2 months ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- Intel Management Engine JTAG Proof of Concept☆20Nov 14, 2019Updated 6 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Jan 19, 2016Updated 10 years ago
- Contributed Python library for the Corellium API☆15Jul 25, 2022Updated 3 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Launch different bash configurations for Linux vs OSX, interactive vs batch☆40Aug 11, 2012Updated 13 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 4 months ago
- ☆29Aug 9, 2016Updated 9 years ago
- macOS codesigning translocation vulnerability.☆44Sep 26, 2021Updated 4 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- ☆12Nov 22, 2016Updated 9 years ago
- Liniaal - A communication extension to Ruler☆99Aug 22, 2018Updated 7 years ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- ☆23May 11, 2022Updated 3 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆248Aug 12, 2014Updated 11 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆88Jul 19, 2018Updated 7 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago