ivan-sincek / powershell-reverse-tcpLinks
PowerShell scripts for communicating with a remote host.
☆304Updated 2 years ago
Alternatives and similar repositories for powershell-reverse-tcp
Users that are interested in powershell-reverse-tcp are comparing it to the libraries listed below
Sorting:
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆607Updated 11 months ago
- An script to perform kerberos bruteforcing by using impacket☆452Updated 3 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆519Updated 2 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,134Updated last month
- PowerShell Script Obfuscator☆563Updated last year
- Collection of PowerShell functions a Red Teamer may use in an engagement☆536Updated last year
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆721Updated 2 weeks ago
- Simple & Powerful PowerShell Script Obfuscator☆572Updated 2 months ago
- A PowerShell armoury for security guys and girls☆473Updated last year
- Assist reverse tcp shells in post-exploration tasks☆222Updated 2 months ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆366Updated 4 years ago
- Windows AV Evasion☆798Updated 5 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆267Updated last year
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆296Updated 4 years ago
- Powershell crazy and sometimes diabolic scripts☆157Updated 4 years ago
- ☆224Updated 5 years ago
- ☆284Updated 4 years ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆414Updated 11 months ago
- Kerberoast attack -pure python-☆438Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆553Updated 3 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆513Updated 4 years ago
- C# Script used for Red Team☆722Updated 3 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆869Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆234Updated 3 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆717Updated 4 years ago
- "Golden" certificates☆696Updated 11 months ago
- Windows active user credential phishing tool☆284Updated 5 years ago
- The Hunt for Malicious Strings☆1,266Updated 2 months ago
- Open source C2 server created for stealth red team operations☆824Updated 2 years ago
- A repository of tools for pentesting of restricted and isolated environments.☆573Updated 3 years ago