- All languages
- Arduino
- Assembly
- Batchfile
- Boo
- C
- C#
- C++
- CMake
- CSS
- CoffeeScript
- Crystal
- Csound Document
- Elm
- Erlang
- F#
- FreeMarker
- Go
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- LiveScript
- Lua
- MDX
- Makefile
- Markdown
- Nunjucks
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Reason
- Ruby
- Rust
- SCSS
- SVG
- Shell
- Standard ML
- TypeScript
- VBScript
- Verilog
- Visual Basic
- Vue
- WebAssembly
- XSLT
- YARA
Starred repositories
PowerSploit - A PowerShell Post-Exploitation Framework
Empire is a PowerShell and Python post-exploitation agent.
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
The goal of this repository is to document the most common techniques to bypass AppLocker.
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
A tool for checking if MFA is enabled on multiple Microsoft Services
Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment
A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the account, if a tenant doesn't exist, if a user doesn't exist, i…
This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.
random powershell goodness
Automation library for Metasploit
Invokes a Windows Security Login Prompt and outputs the clear text password.
Uses Invoke-Shellcode to execute a payload and persist on the system.
A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem
enigma0x3 / windows-operating-system-archaeology
Forked from jeperez/windows-operating-system-archaeologywindows-operating-system-archaeology @Enigma0x3 @subTee
byt3bl33d3r / PowerSploit
Forked from PowerShellMafia/PowerSploitPowerSploit - A PowerShell Post-Exploitation Framework
byt3bl33d3r / Empire
Forked from BC-SECURITY/EmpireEmpire is a PowerShell and Python 3.x post-exploitation framework.
My musings with PowerShell
enigma0x3 / Empire
Forked from EmpireProject/EmpireEmpire is a pure PowerShell post-exploitation agent.
ZephrFish / PowerSploit
Forked from PowerShellMafia/PowerSploitPowerSploit - A PowerShell Post-Exploitation Framework
enigma0x3 / BCD
Forked from mattifestation/BCDBCD is a module to interact with boot configuration data (BCD) either locally or remotely using the ROOT/WMI:Bcd* WMI classes. The functionality of the functions in this module mirror that of bcded…
This is used for contributions to the Windows 10 content for IT professionals on docs.microsoft.com.
xtr4nge / nishang
Forked from samratashok/nishangNishang - PowerShell for penetration testing and offensive security.