mdsecactivebreach / PowerDNSLinks
PowerDNS: Powershell DNS Delivery
☆214Updated 7 years ago
Alternatives and similar repositories for PowerDNS
Users that are interested in PowerDNS are comparing it to the libraries listed below
Sorting:
- Liniaal - A communication extension to Ruler☆99Updated 7 years ago
- Domain user enumeration tool☆214Updated 2 years ago
- Various Cheat Sheets☆183Updated 4 years ago
- ☆182Updated 7 years ago
- ☆73Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloads☆121Updated 8 years ago
- ☆273Updated 3 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Updated 6 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆272Updated 4 years ago
- Cobalt Strike SCT payload obfuscator☆144Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Updated 8 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 9 months ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆254Updated 7 years ago
- A collection of useful scripts for Cobalt Strike☆174Updated last year
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆120Updated 5 years ago
- How To Execute Shellcode via HTA☆141Updated 7 years ago
- Encode powershell payload into bat files☆155Updated 7 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆288Updated 8 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Updated 7 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆116Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 6 years ago
- A command line tool for creating malicious outlook rules☆165Updated 7 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Updated 7 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆145Updated 4 years ago
- Lateral Movement technique using DCOM and HTA☆235Updated 3 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆156Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆273Updated 5 years ago
- Powershell module to assist in attacking Exchange/Outlook Web Access☆182Updated 9 years ago
- Responsive Command and Control System☆102Updated 3 years ago
- Port of eternal blue exploits to powershell☆150Updated 8 years ago