giMini / RWMC
RWMC is no longer supported. Please use PowerMemory.
☆165Updated 9 years ago
Alternatives and similar repositories for RWMC:
Users that are interested in RWMC are comparing it to the libraries listed below
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆253Updated 9 years ago
- Connection-less Powershell Persistent and Resilient Backdoor☆232Updated 9 years ago
- Exploit the credentials present in files and memory☆839Updated last year
- Currently not updated for WMIEvent module...☆262Updated 9 years ago
- A framework for PowerShell and PoshSec scripts for network management, security, and maintenance.☆144Updated 2 years ago
- A PowerShell TCP/IP swiss army knife.☆562Updated 7 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆486Updated 7 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆326Updated 8 years ago
- PoshSec PowerShell Module☆161Updated 6 years ago
- Powershell-based Windows Security Auditing Toolbox☆576Updated 6 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆381Updated 8 months ago
- PowerShell Empire Web Interface☆329Updated last year
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago
- DefCon24☆121Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆294Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆32Updated 9 years ago
- A collection of post-exploitation tools for network red teaming.☆138Updated 6 years ago
- Some PowerShell Defensive Scripts☆127Updated 8 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆209Updated 9 years ago
- A PoC WMI backdoor presented at Black Hat 2015☆273Updated 9 years ago
- Automated Responder/secretsdump.py cracking☆182Updated 8 years ago
- Auto Domain Admin and Network Exploitation.☆298Updated 7 years ago
- Materials of Workshop presented at DEFCON 25☆108Updated 7 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆258Updated 8 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- ☆138Updated 7 years ago
- Powershell C2 Server and Implants☆574Updated 5 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆739Updated 6 years ago
- A script to test an RDP host for sticky keys and utilman backdoor.☆257Updated 8 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆316Updated 7 years ago