Functions that can be used to gain Reverse Shells with PowerShell
☆83Sep 4, 2022Updated 3 years ago
Alternatives and similar repositories for ReversePowerShell
Users that are interested in ReversePowerShell are comparing it to the libraries listed below
Sorting:
- PowerShell cmdlets you may find useful☆14Jan 8, 2025Updated last year
- ☆15Aug 17, 2023Updated 2 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆88Oct 4, 2023Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆145Updated this week
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Microsoft Exchange password spray tool with proxy support.☆39Jul 9, 2021Updated 4 years ago
- Collection of PowerShell functions a Red Teamer may use in an engagement☆547Dec 8, 2023Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Updated this week
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Jun 15, 2024Updated last year
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 3 years ago
- redteamrecipe.com☆24Feb 9, 2024Updated 2 years ago
- A python-based padding oracle tool☆20Updated this week
- Cross-platform RAT, written in C☆88Oct 8, 2022Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Angecryption PoC☆12Mar 27, 2014Updated 11 years ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- PowerShell SOCKS proxy with reverse proxy capabilities☆84Apr 23, 2021Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Nov 22, 2019Updated 6 years ago
- web network analyzer☆14Dec 3, 2023Updated 2 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access e…☆42Jan 12, 2022Updated 4 years ago
- WebHook for Red Team☆26Feb 27, 2021Updated 5 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago