-
@Caijijijijijiji
- Earth
Stars
- All languages
- Alloy
- Assembly
- Batchfile
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Cairo
- Classic ASP
- CodeQL
- Dockerfile
- Go
- Groff
- HCL
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Meson
- Objective-C
- PHP
- Perl
- PowerShell
- Python
- Raku
- Rich Text Format
- Ruby
- Rust
- Shell
- Smali
- Solidity
- Svelte
- TeX
- TypeScript
- VBA
- Visual Basic
- Visual Basic .NET
- Vue
- XSLT
- YARA
- Yul
PowerSploit - A PowerShell Post-Exploitation Framework
Six Degrees of Domain Admin
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Empire is a PowerShell and Python post-exploitation agent.
Automation for internal Windows Penetrationtest / AD-Security
The Official Bash Bunny Payload Repository
My musings with PowerShell
A collection of scripts for assessing Microsoft Azure security
PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.
A post-exploitation powershell tool for extracting juicy info from memory.
PowerShell MachineAccountQuota and DNS exploit tools
RedSnarf is a pen-testing / red-teaming tool for Windows environments
Some usefull Scripts and Executables for Pentest & Forensics
Exploit the credentials present in files and memory
This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported is translated into a WMI-equivalent for use on a network/rem…
SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket
Socks proxy, and reverse socks server using powershell.
Exchange privilege escalations to Active Directory
PowerShell Script to Dump Windows Credentials from the Credential Manager
retrieve information via O365 and AzureAD with a valid cred
Red Team Scripts by d0nkeys (ex SnadoTeam)
This repo contains Powershell scripts used for general hackery.
Aggressor Script, Kits, Malleable C2 Profiles, External C2 and so on
Toolbox containing research notes & PoC code for weaponizing .NET's DLR