Awesome tools to exploit Windows !
-
Updated
May 21, 2022
Awesome tools to exploit Windows !
Powershell modules and commands that come in handy for pentests and red team assessments.
Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.
A sophisticated PowerShell C2 client for remote command execution and reporting. It includes a Windows reverse shell payload generator and handler using the HTTPS protocol. The client polls a Python-based web server (REST API) for commands, executes them locally, and returns the results.
后渗透阶段在域内利用 ATA 进行信息侦查(Abusing ATA for domain reconnaissance during the post-exploitation stage.)
Search for interesting data in network shares or drives
Add a description, image, and links to the post-exploitation-powershell topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation-powershell topic, visit your repo's landing page and select "manage topics."