Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for powershell attacker
attacker
x
powershell
x
14 search results found
Mitigating Web Shells
⭐
895
Guidance for mitigation web shells. #nsacyber
Skyark
⭐
725
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
Credsleaker
⭐
251
Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
Psbypassclm
⭐
166
Bypass for PowerShell Constrained Language Mode
Lovely Potato
⭐
118
Automating juicy potato local privilege escalation exploit for penetration testers.
Invoke Zerologon
⭐
68
Invoke-ZeroLogon allows attackers to impersonate any computer, including the domain controller itself, and execute remote procedure calls on their behalf.
Sticky Keys Scanner
⭐
21
A PowerShell function that scans for the existence of a Sticky Keys backdoor.
Attackingad
⭐
21
This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.
Gmailpersist
⭐
16
Gmail Knocker
Beefpurloin
⭐
15
Exploits USB HID to steal passwords saved in Google Chrome
Penteensy
⭐
13
USB HID for Penetration Testing
Serveruntrustaccount
⭐
8
A technique for Active Directory domain persistence
Pentest_env
⭐
6
An environment that allows some pentesting with disposable attacker and defender maschines
Os Defaults_research
⭐
5
Information pertaining to OS install defaults to baseline normal for a given OS.
Related Searches
Script Powershell (2,243)
Powershell Azure (1,583)
C Sharp Powershell (1,000)
Powershell Microsoft (754)
Command Line Powershell (636)
Python Powershell (603)
Server Powershell (436)
Docker Powershell (407)
Deployment Powershell (398)
Sql Powershell (390)
1-14 of 14 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.