tobor88 / ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
☆83Updated 2 years ago
Alternatives and similar repositories for ReversePowerShell:
Users that are interested in ReversePowerShell are comparing it to the libraries listed below
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Updated last week
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 3 years ago
- ☆150Updated last year
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆232Updated 3 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆220Updated 2 years ago
- Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls…☆216Updated 4 years ago
- CLI Frontend for PowerShell Empire.☆48Updated 3 years ago
- POC of SecureWorks' recent Azure Active Directory password brute-forcing vuln☆190Updated 3 years ago
- Powershell crazy and sometimes diabolic scripts☆155Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆176Updated 3 weeks ago
- Some random tools I use for penetration testing☆88Updated 3 weeks ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆212Updated 4 years ago
- PowerShell payload generator☆116Updated 3 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 5 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆215Updated 2 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆128Updated 3 years ago
- Basic C2 Server☆190Updated 3 years ago
- Windows privilege escalation with cmd☆91Updated 3 years ago
- Active Directory Lab for Penetration Testing☆51Updated 4 years ago
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆172Updated 4 years ago
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆208Updated 4 years ago
- Collection of cyphers for bloodhound☆149Updated 10 months ago
- Simple script to generate commands to achieve reverse shells.☆117Updated 4 years ago
- ☆104Updated 5 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- An advanced graphical search engine for Exploit-DB☆118Updated 11 months ago
- ☆52Updated 6 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆80Updated 3 years ago