A port scanner written purely in PowerShell.
☆83Sep 13, 2023Updated 2 years ago
Alternatives and similar repositories for PS2
Users that are interested in PS2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 5 years ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆116Feb 13, 2022Updated 4 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- The king of shell -Javaweb Memory Shell☆27Mar 29, 2023Updated 3 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆261May 10, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆412Dec 14, 2023Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆570Jun 5, 2023Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- A simple to use single-include Windows API resolver☆22Jul 9, 2024Updated last year
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Apr 13, 2023Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆485Oct 14, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- Attempt at Obfuscated version of SharpCollection☆259Nov 15, 2025Updated 5 months ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆504May 16, 2023Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆185May 19, 2025Updated 11 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆649Mar 20, 2024Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆743May 19, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆593Mar 19, 2024Updated 2 years ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆227Nov 23, 2023Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 7 months ago
- ☆224Oct 22, 2023Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Sep 29, 2025Updated 7 months ago
- ☆19Mar 4, 2023Updated 3 years ago
- DPAPI looting remotely and locally in Python☆549Mar 13, 2026Updated last month
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆124Apr 9, 2022Updated 4 years ago
- ☆1,683Apr 14, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆373Dec 24, 2021Updated 4 years ago
- ☆490Nov 20, 2022Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Script to audit / deploy LAPS☆26Feb 25, 2025Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- Azure DevOps Services Attack Toolkit☆315Mar 15, 2025Updated last year
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago