Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

post-exploitation-powershell

Here are 6 public repositories matching this topic...

Language:All
Filter by language

Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.

  • UpdatedAug 6, 2022
  • PowerShell

A sophisticated PowerShell C2 client for remote command execution and reporting. It includes a Windows reverse shell payload generator and handler using the HTTPS protocol. The client polls a Python-based web server (REST API) for commands, executes them locally, and returns the results.

  • UpdatedJun 10, 2024
  • Python

后渗透阶段在域内利用 ATA 进行信息侦查(Abusing ATA for domain reconnaissance during the post-exploitation stage.)

  • UpdatedJul 1, 2023
  • PowerShell

Search for interesting data in network shares or drives

  • UpdatedMay 23, 2024
  • PowerShell

Improve this page

Add a description, image, and links to thepost-exploitation-powershell topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with thepost-exploitation-powershell topic, visit your repo's landing page and select "manage topics."

Learn more


[8]ページ先頭

©2009-2025 Movatter.jp