Powershell modules and commands that come in handy for pentests and red team assessments.
☆20Oct 31, 2018Updated 7 years ago
Alternatives and similar repositories for OffensivePowerShell
Users that are interested in OffensivePowerShell are comparing it to the libraries listed below
Sorting:
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- ip-keyloger☆10Jan 9, 2026Updated 2 months ago
- P2P cryto-currency with dashpay and blackcoin Hybird feature☆12Feb 28, 2022Updated 4 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- A port of Rack for the JavaScript JSGI web server interface☆36Oct 14, 2010Updated 15 years ago
- Todos los scripts y locuras del Blog SniferL4bs que sean desarrollados vendran en esta pequeña sección dedicada☆21Jun 22, 2024Updated last year
- OverWatchINT is an Open Source Intelligence and All-in-One Hacking Tool. It's purpose is to reduce the time and efforts of security resea…☆11May 15, 2022Updated 3 years ago
- A Ghidra script to aid reverse engineering of Android native (.so) libraries, by identifying dynamically registered functions within the …☆16Feb 27, 2024Updated 2 years ago
- Tool to dump cisco device configs via snmp and/or add new users☆13Mar 10, 2026Updated last week
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Apr 23, 2019Updated 6 years ago
- Movement Detector using python☆10Jan 5, 2021Updated 5 years ago
- ☆11Mar 2, 2019Updated 7 years ago
- Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources☆15Dec 29, 2025Updated 2 months ago
- ☆17Apr 5, 2021Updated 4 years ago
- Python scripts to maintain Monero opennodes DNS records☆18Mar 10, 2024Updated 2 years ago
- A chat application with end to end encryption with centralized authentication system using Raspberry pi and a 4x4 Matrix Keypad for secur…☆13Mar 21, 2023Updated 2 years ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆64Dec 18, 2024Updated last year
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆32Jan 28, 2026Updated last month
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13May 19, 2024Updated last year
- Electronic Medical Records system for Uganda☆18Jul 13, 2021Updated 4 years ago
- OWASP Foundation Web Repository☆19Feb 19, 2026Updated last month
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Feb 19, 2020Updated 6 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- ☆23Jul 1, 2023Updated 2 years ago
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python …☆24Aug 29, 2021Updated 4 years ago
- a simple program to print invoice in python☆18Feb 11, 2024Updated 2 years ago
- Payload Creation Framework 👨💻☆22Jul 5, 2021Updated 4 years ago
- My pentest tools used two years ago.☆21May 11, 2017Updated 8 years ago
- notes management app written in Python & Kivy(MD)☆27Dec 14, 2023Updated 2 years ago
- Python CCDA parsing engine☆24Jul 9, 2018Updated 7 years ago
- Project Aplikasi Web CMS untuk Fansub dan Fanshare untuk menata rilisan Anime yang sangat berfaedah. Dibangun menggunakan CodeIgniter 3.1…☆25Dec 25, 2025Updated 2 months ago
- Pentesting Mobile apps and resources www.sniferl4bs.com☆39Jul 10, 2021Updated 4 years ago
- Blockchain technology has to be one of the biggest technology innovations of the past few years. The top emerging blockchain development …☆29Aug 13, 2022Updated 3 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago