giMini / RWMCLinks
RWMC is no longer supported. Please use PowerMemory.
☆164Updated 9 years ago
Alternatives and similar repositories for RWMC
Users that are interested in RWMC are comparing it to the libraries listed below
Sorting:
- PowerSploit - A PowerShell Post-Exploitation Framework☆32Updated 9 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆254Updated 9 years ago
- Connection-less Powershell Persistent and Resilient Backdoor☆232Updated 9 years ago
- A framework for PowerShell and PoshSec scripts for network management, security, and maintenance.☆144Updated 2 years ago
- Currently not updated for WMIEvent module...☆262Updated 9 years ago
- Exploit the credentials present in files and memory☆845Updated 2 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 9 years ago
- A collection of post-exploitation tools for network red teaming.☆138Updated 6 years ago
- A PowerShell TCP/IP swiss army knife.☆567Updated 8 years ago
- PoshSec PowerShell Module☆160Updated 7 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆488Updated 8 years ago
- ☆120Updated 9 years ago
- Next Generation Firewall Audit and Bypass Tool☆267Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Updated 4 years ago
- WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections☆241Updated 8 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆385Updated last year
- ☆129Updated 10 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆325Updated 9 years ago
- Auto Domain Admin and Network Exploitation.☆300Updated 7 years ago
- PowerShell Empire Web Interface☆331Updated 2 years ago
- ☆427Updated 8 years ago
- Powershell-based Windows Security Auditing Toolbox☆575Updated 6 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆506Updated 3 years ago
- Materials of Workshop presented at DEFCON 25☆107Updated 8 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 8 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- A PoC WMI backdoor presented at Black Hat 2015☆275Updated 10 years ago
- Active Directory enumeration from non-domain system.☆117Updated 8 years ago
- DefCon24☆121Updated 8 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆209Updated 9 years ago