ivan-sincek / powershell-reverse-tcpLinks
PowerShell scripts for communicating with a remote host.
☆305Updated 2 years ago
Alternatives and similar repositories for powershell-reverse-tcp
Users that are interested in powershell-reverse-tcp are comparing it to the libraries listed below
Sorting:
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆605Updated last year
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆520Updated 2 years ago
- Collection of PowerShell functions a Red Teamer may use in an engagement☆542Updated last year
- An script to perform kerberos bruteforcing by using impacket☆456Updated 3 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,142Updated 2 months ago
- Powershell crazy and sometimes diabolic scripts☆160Updated 5 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆293Updated 4 years ago
- ☆294Updated 4 years ago
- PowerShell Script Obfuscator☆580Updated 2 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆368Updated 5 years ago
- Assist reverse tcp shells in post-exploration tasks☆221Updated last month
- Simple & Powerful PowerShell Script Obfuscator☆585Updated 6 months ago
- Windows AV Evasion☆818Updated 5 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆876Updated 4 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆730Updated 3 weeks ago
- Kerberoast attack -pure python-☆436Updated last year
- A PowerShell armoury for security guys and girls☆470Updated last year
- ☆244Updated 5 years ago
- Open source C2 server created for stealth red team operations☆829Updated 3 years ago
- Bypass for PowerShell Constrained Language Mode☆402Updated 3 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆516Updated 5 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆730Updated 5 years ago
- C# Script used for Red Team☆723Updated 4 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆270Updated 2 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆544Updated 2 months ago
- A small reverse shell for Linux & Windows☆616Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆553Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆433Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆581Updated 3 months ago
- Manipulating and Abusing Windows Access Tokens.☆289Updated 4 years ago