post-exploitation-powershell
Here are 6 public repositories matching this topic...
Language:All
Awesome tools to exploit Windows !
- Updated
May 21, 2022
Powershell modules and commands that come in handy for pentests and red team assessments.
- Updated
Oct 31, 2018
Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.
- Updated
Aug 6, 2022 - PowerShell
A sophisticated PowerShell C2 client for remote command execution and reporting. It includes a Windows reverse shell payload generator and handler using the HTTPS protocol. The client polls a Python-based web server (REST API) for commands, executes them locally, and returns the results.
- Updated
Jun 10, 2024 - Python
后渗透阶段在域内利用 ATA 进行信息侦查(Abusing ATA for domain reconnaissance during the post-exploitation stage.)
- Updated
Jul 1, 2023 - PowerShell
Search for interesting data in network shares or drives
- Updated
May 23, 2024 - PowerShell
Improve this page
Add a description, image, and links to thepost-exploitation-powershell topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with thepost-exploitation-powershell topic, visit your repo's landing page and select "manage topics."