A PowerShell module that contains different functions that can be used for pranking your fellow co-worker or anyone else for that matter.
☆64Jun 28, 2022Updated 3 years ago
Alternatives and similar repositories for PowerShell-Troll
Users that are interested in PowerShell-Troll are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Jul 7, 2022Updated 3 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- Show the time in Roman Numerals☆11Jan 23, 2020Updated 6 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- Encryption Abstraction Layer and Utilities for ratnet☆18May 3, 2024Updated last year
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆48Nov 9, 2025Updated 4 months ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- ☆33Aug 14, 2020Updated 5 years ago
- SQL injection via bruteforced MD5 hash reflection of random strings☆53Feb 11, 2019Updated 7 years ago
- DEPRECATED: Tool for checking data leaks of social media platforms☆10Feb 20, 2022Updated 4 years ago
- ☆45Jul 12, 2018Updated 7 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- A Web Server to hide stuff☆21Apr 29, 2022Updated 3 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆63May 25, 2019Updated 6 years ago
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- ☆12Apr 21, 2019Updated 6 years ago
- Modular rootkit framework.☆30Mar 26, 2021Updated 4 years ago
- JavaScript for Automation (JXA) version of Patrick Wardle's tool that searches applications for dylib hijacking opportunities☆22Aug 6, 2019Updated 6 years ago
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 5 months ago
- My CobaltStrike BOFS☆167Jul 23, 2022Updated 3 years ago
- Sustainable shellcode evasion☆113Updated this week
- A Go parser for the /etc/passwd file☆21Feb 14, 2024Updated 2 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- ☆71Sep 17, 2020Updated 5 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- ☆12Jan 16, 2018Updated 8 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Aug 25, 2020Updated 5 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆274Jan 27, 2021Updated 5 years ago