ivan-sincek / powershell-reverse-tcpLinks
PowerShell scripts for communicating with a remote host.
☆303Updated 2 years ago
Alternatives and similar repositories for powershell-reverse-tcp
Users that are interested in powershell-reverse-tcp are comparing it to the libraries listed below
Sorting:
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆605Updated last year
- An script to perform kerberos bruteforcing by using impacket☆457Updated 3 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆519Updated 2 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆294Updated 4 years ago
- Collection of PowerShell functions a Red Teamer may use in an engagement☆537Updated last year
- Simple & Powerful PowerShell Script Obfuscator☆580Updated 4 months ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,137Updated last month
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆367Updated 4 years ago
- ☆291Updated 4 years ago
- A PowerShell armoury for security guys and girls☆470Updated last year
- PowerShell Script Obfuscator☆570Updated last year
- Assist reverse tcp shells in post-exploration tasks☆221Updated 4 months ago
- Powershell crazy and sometimes diabolic scripts☆159Updated 5 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆724Updated 2 months ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆562Updated last month
- ☆238Updated 5 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆270Updated 2 years ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆384Updated this week
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆725Updated 4 years ago
- Windows AV Evasion☆809Updated 5 years ago
- Kerberoast attack -pure python-☆436Updated last year
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆420Updated last year
- The Hunt for Malicious Strings☆1,295Updated 4 months ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Updated 5 years ago
- C# Script used for Red Team☆723Updated 3 years ago
- Manipulating and Abusing Windows Access Tokens.☆282Updated 4 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆897Updated 4 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆876Updated 4 years ago
- Bypass for PowerShell Constrained Language Mode☆400Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆236Updated 3 years ago