Collection of PowerShell functions a Red Teamer may use in an engagement
☆547Dec 8, 2023Updated 2 years ago
Alternatives and similar repositories for PowerShell-Red-Team
Users that are interested in PowerShell-Red-Team are comparing it to the libraries listed below
Sorting:
- ☆1,674Apr 14, 2025Updated 11 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,650Aug 28, 2025Updated 6 months ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,575Nov 9, 2021Updated 4 years ago
- A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.☆635Oct 18, 2025Updated 5 months ago
- Azure Security Resources and Notes☆1,716Feb 17, 2026Updated last month
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,134Nov 28, 2024Updated last year
- ☆361Apr 24, 2021Updated 4 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆373Oct 30, 2020Updated 5 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆600Aug 27, 2024Updated last year
- Various PowerShell scripts that may be useful during red team exercise☆962Apr 28, 2022Updated 3 years ago
- The Hunt for Malicious Strings☆1,368May 13, 2025Updated 10 months ago
- PowerShell rebuilt in C# for Red Teaming purposes☆1,052Feb 27, 2026Updated 3 weeks ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,151Dec 11, 2025Updated 3 months ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆786Updated this week
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆617Feb 16, 2023Updated 3 years ago
- PowerShell Script Obfuscator☆597Nov 2, 2023Updated 2 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Some notes and examples for cobalt strike's functionality☆1,129Feb 8, 2022Updated 4 years ago
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,135Oct 21, 2024Updated last year
- ☆1,532Aug 11, 2023Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Oct 17, 2023Updated 2 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆839Oct 29, 2025Updated 4 months ago
- A PowerShell armoury for security guys and girls☆467Jan 23, 2024Updated 2 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆880Mar 29, 2021Updated 4 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆931Jul 26, 2021Updated 4 years ago
- ☆667Nov 17, 2021Updated 4 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆844Oct 3, 2021Updated 4 years ago
- PowerShell payload generator☆120Sep 30, 2021Updated 4 years ago
- Template-Driven AV/EDR Evasion Framework☆1,786Nov 3, 2023Updated 2 years ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆1,013Nov 7, 2021Updated 4 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,308Aug 19, 2019Updated 6 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,264Apr 12, 2024Updated last year
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,122Feb 27, 2026Updated 3 weeks ago
- Windows Privilege Escalation from User to Domain Admin.☆1,451Dec 18, 2022Updated 3 years ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,805Updated this week
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,093Nov 20, 2025Updated 4 months ago
- Kerberoast attack -pure python-☆433Nov 30, 2023Updated 2 years ago