ivan-sincek / powershell-reverse-tcpLinks
PowerShell scripts for communicating with a remote host.
☆303Updated 2 years ago
Alternatives and similar repositories for powershell-reverse-tcp
Users that are interested in powershell-reverse-tcp are comparing it to the libraries listed below
Sorting:
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆604Updated last year
- Some usefull Scripts and Executables for Pentest & Forensics☆1,138Updated 2 months ago
- Collection of PowerShell functions a Red Teamer may use in an engagement☆541Updated last year
- An script to perform kerberos bruteforcing by using impacket☆456Updated 3 years ago
- A PowerShell armoury for security guys and girls☆470Updated last year
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆520Updated 2 years ago
- PowerShell Script Obfuscator☆574Updated last year
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆292Updated 4 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆368Updated 5 years ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆443Updated last year
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Updated 5 years ago
- Powershell crazy and sometimes diabolic scripts☆159Updated 5 years ago
- Assist reverse tcp shells in post-exploration tasks☆221Updated 2 weeks ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆727Updated last week
- ☆293Updated 4 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆876Updated 4 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆571Updated 2 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆306Updated 2 years ago
- Simple & Powerful PowerShell Script Obfuscator☆583Updated 5 months ago
- A repository of tools for pentesting of restricted and isolated environments.☆579Updated 4 years ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆384Updated last week
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆421Updated last year
- C# Script used for Red Team☆723Updated 3 years ago
- Open source C2 server created for stealth red team operations☆829Updated 3 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆270Updated 2 years ago
- Kerberoast attack -pure python-☆436Updated last year
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆544Updated last month
- Bypass for PowerShell Constrained Language Mode☆401Updated 3 years ago
- Generate obfuscated meterpreter shells☆232Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆432Updated 3 years ago