tobor88 / ReversePowerShellLinks
Functions that can be used to gain Reverse Shells with PowerShell
☆83Updated 3 years ago
Alternatives and similar repositories for ReversePowerShell
Users that are interested in ReversePowerShell are comparing it to the libraries listed below
Sorting:
- ☆156Updated 2 months ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Updated 2 weeks ago
- CLI Frontend for PowerShell Empire.☆49Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- Windows privilege escalation with cmd☆90Updated 4 years ago
- ☆36Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 5 years ago
- Open-Source Collection of Social Engineering Pretexts☆142Updated 2 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- PowerShell payload generator☆120Updated 4 years ago
- Cheat-Sheet of tools for penetration testing☆54Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- handy powershell scripts☆66Updated last year
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Password list generator for password spraying - prebaked with goodies☆108Updated 2 years ago
- ☆102Updated 6 years ago
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆120Updated last year
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆180Updated 9 months ago
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated 2 weeks ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆104Updated 4 years ago
- A polyglot payload generator☆242Updated 3 years ago
- Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more☆123Updated 5 years ago
- Powershell crazy and sometimes diabolic scripts☆160Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆181Updated 4 years ago
- An HTTP Reverse Shell in Python☆82Updated 2 years ago