Highlights
- Pro
sec ps1
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Automation for internal Windows Penetrationtest / AD-Security
Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell process is created, the implant will be executed too.
DNS Tunneling using powershell to download and execute a payload. Works in CLM.
Powershell tool to automate Active Directory enumeration.
A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository…
PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.
A solution to create obfuscated reverse shells for PowerShell.
Windows Local Privilege Escalation Cookbook
PowerSploit - A PowerShell Post-Exploitation Framework
Simple & Powerful PowerShell Script Obfuscator
PowerShell Ransomware Simulator with C2 Server
Assess Windows OS for security misconfigurations and hardening opportunities.
Powershell shellcode one-liner. Powershell免杀一句话上线器便捷生成
Privilege Escalation Enumeration Script for Windows
A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell.
Tool to audit and attack LAPS environments
PowerShell rebuilt in C# for Red Teaming purposes
getsystem via parent process using ps1 & embeded c#
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be r…