perplexityjeff / PowerShell-TrollLinks
A PowerShell module that contains different functions that can be used for pranking your fellow co-worker or anyone else for that matter.
☆62Updated 3 years ago
Alternatives and similar repositories for PowerShell-Troll
Users that are interested in PowerShell-Troll are comparing it to the libraries listed below
Sorting:
- Windows 10 De-Clutter script☆25Updated 5 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆55Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- Some simple scripts for decrypting passwords retrieved from a Manage Engine OpManager installation☆11Updated 9 years ago
- Powershell script to exfiltrate large files quickly and securely☆125Updated 3 years ago
- Download and Execute PowerShell scripts on remote hosts with ease.☆24Updated 10 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆98Updated 8 months ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Updated 3 years ago
- Post-exploitation NTLM password hash extractor☆20Updated 4 years ago
- Modular rootkit framework.☆30Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- ☆26Updated 6 years ago
- generates weak passwords based on current date☆43Updated last year
- Fixes and patches☆20Updated 4 years ago
- Powershell script that decrypts the data stored within a Thycotic Secret Server☆84Updated 5 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆114Updated 4 years ago
- Get chrome passwords from chrome database in powershell☆32Updated 6 years ago
- One-off scripts☆52Updated 8 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Hiding implants in HTML files☆65Updated 5 years ago
- Full malware Kit☆57Updated 4 years ago
- My take on the Win10 Task Cleaner UAC bypass.☆19Updated 6 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- Ansible scripts to build an attack box☆25Updated 7 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆81Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- ☆22Updated 7 years ago