ivan-sincek / powershell-reverse-tcpLinks
PowerShell scripts for communicating with a remote host.
☆304Updated 2 years ago
Alternatives and similar repositories for powershell-reverse-tcp
Users that are interested in powershell-reverse-tcp are comparing it to the libraries listed below
Sorting:
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆605Updated last year
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆517Updated 2 years ago
- Collection of PowerShell functions a Red Teamer may use in an engagement☆541Updated last year
- An script to perform kerberos bruteforcing by using impacket☆456Updated 3 years ago
- PowerShell Script Obfuscator☆568Updated last year
- Some usefull Scripts and Executables for Pentest & Forensics☆1,140Updated 3 weeks ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆723Updated 4 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆294Updated 4 years ago
- ☆290Updated 4 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆367Updated 4 years ago
- Simple & Powerful PowerShell Script Obfuscator☆578Updated 4 months ago
- Powershell crazy and sometimes diabolic scripts☆159Updated 5 years ago
- A PowerShell armoury for security guys and girls☆470Updated last year
- Assist reverse tcp shells in post-exploration tasks☆221Updated 4 months ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Updated 4 years ago
- Generate obfuscated meterpreter shells☆232Updated 4 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆442Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,010Updated last year
- Kerberoast attack -pure python-☆436Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆236Updated 3 years ago
- "Golden" certificates☆704Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆303Updated 2 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆723Updated 2 months ago
- Windows AV Evasion☆808Updated 5 years ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆418Updated last year
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆384Updated this week
- Manipulating and Abusing Windows Access Tokens.☆281Updated 4 years ago
- A repository of tools for pentesting of restricted and isolated environments.☆576Updated 3 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆874Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆430Updated 3 years ago