jxroot / powtelLinks
Control a system remotely via telegram in Powershell
☆14Updated 10 months ago
Alternatives and similar repositories for powtel
Users that are interested in powtel are comparing it to the libraries listed below
Sorting:
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆10Updated 2 weeks ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 3 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- hiding in plain sight: part 2☆44Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- ☆14Updated 10 months ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆36Updated 2 weeks ago
- Enumeration & fingerprint tool☆24Updated last year
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 4 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Updated 3 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Updated 3 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Updated last year
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Updated 5 years ago
- A PowerShell script that simplifies life and therefore... phishing.☆20Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Slides and videos from talks given at cons☆25Updated 7 months ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆18Updated 3 weeks ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Legba recipes.☆51Updated last year