PowerShellArmoury – A PowerShell armoury for security
#PowerShell #ps1 #Microsoft #Security
https://reconshell.com/powershellarmoury-a-powershell-armoury-for-security/
#PowerShell #ps1 #Microsoft #Security
https://reconshell.com/powershellarmoury-a-powershell-armoury-for-security/
Penetration Testing Tools, ML and Linux Tutorials
PowerShellArmoury - A PowerShell armoury for security - Penetration Testing Tools, ML and Linux Tutorials
The PowerShell Armoury is meant for pentesters, "insert-color-here"-teamers and everyone else who uses a variety of PowerShell tools during their engagements.
EarlyBird - injecting cobalt strike shellcode to powershell
#CobaltStrike #shellcode #powershell #EarlyBird
https://reconshell.com/earlybird-injecting-cobalt-strike-shellcode-to-powershell/
#CobaltStrike #shellcode #powershell #EarlyBird
https://reconshell.com/earlybird-injecting-cobalt-strike-shellcode-to-powershell/
Penetration Testing Tools, ML and Linux Tutorials
EarlyBird - injecting cobalt strike shellcode to powershell - Penetration Testing Tools, ML and Linux Tutorials
EarlyBird: a poc of using the tech with syscalls on powershell.exe injecting cobalt strike shellcode to powershell.exe using EarlyBird Tech USAGE: first get
SharpStrike - Post exploitation tool
#Postexploitation #LateralMovement #WMI #PowerShell
#SharpStrike #InfoSec #AppSec
https://reconshell.com/sharpstrike-post-exploitation-tool/
#Postexploitation #LateralMovement #WMI #PowerShell
#SharpStrike #InfoSec #AppSec
https://reconshell.com/sharpstrike-post-exploitation-tool/
Penetration Testing Tools, ML and Linux Tutorials
SharpStrike - Post exploitation tool - Penetration Testing Tools, ML and Linux Tutorials
SharpStrike is a post-exploitation tool written in C# that uses either CIM or WMI to query remote systems. It can use provided credentials or the current
Azure Red Team -Azure Security Resources and Notes
#Azure #RedTeam #Enumeration #AzureAD #Powershell #AD
#Phishing #Microsoft #Pentesting #VAPT #shell #PowerZure
https://reconshell.com/azure-red-team-azure-security-resources-and-notes/
#Azure #RedTeam #Enumeration #AzureAD #Powershell #AD
#Phishing #Microsoft #Pentesting #VAPT #shell #PowerZure
https://reconshell.com/azure-red-team-azure-security-resources-and-notes/
Penetration Testing Tools, ML and Linux Tutorials
Azure Red Team -Azure Security Resources and Notes - Penetration Testing Tools, ML and Linux Tutorials
EDITED EDITION — Getting Started in Pentesting The Cloud–Azure | Beau Bullock | 1-Hour
AzureHunter - A Cloud Forensics Powershell module
#Azure #Develop #Cloud #Forensics #Powershell #AzureHunter
https://reconshell.com/azurehunter-a-cloud-forensics-powershell-module/
#Azure #Develop #Cloud #Forensics #Powershell #AzureHunter
https://reconshell.com/azurehunter-a-cloud-forensics-powershell-module/
PowerShx - Run Powershell without software restrictions
#PowerShell #Payload #PowerShx #AMSI #Bypass #Microsoft #Cmdlets
https://reconshell.com/powershx-run-powershell-without-software-restrictions/
#PowerShell #Payload #PowerShx #AMSI #Bypass #Microsoft #Cmdlets
https://reconshell.com/powershx-run-powershell-without-software-restrictions/
Penetration Testing Tools, ML and Linux Tutorials
PowerShx - Run Powershell without software restrictions. - Penetration Testing Tools, ML and Linux Tutorials
Unmanaged PowerShell execution using DLLs or a standalone executable.
EXOCET - AV-evading undetectable payload delivery tool
#APT41 #Mimikatz #PowerShell #CyberThreat #shellcode
#msfvenom #Malware #Metasploit #crypters
https://reconshell.com/exocet-av-evading-undetectable-payload-delivery-tool/
#APT41 #Mimikatz #PowerShell #CyberThreat #shellcode
#msfvenom #Malware #Metasploit #crypters
https://reconshell.com/exocet-av-evading-undetectable-payload-delivery-tool/
Penetration Testing Tools, ML and Linux Tutorials
EXOCET - AV-evading undetectable payload delivery tool - Penetration Testing Tools, ML and Linux Tutorials
EXOCET is superior to Metasploit's "Evasive Payloads" modules as EXOCET uses AES-256 in GCM Mode (Galois/Counter Mode). Metasploit's Evasion Payloads uses a
ADLab – Active Directory lab environment to practice penetration testing
#ActiveDirectory #AD #PenetrationTesting #PowerShell #DomainController
https://reconshell.com/adlab-active-directory-lab-environment-to-practice-penetration-testing/
#ActiveDirectory #AD #PenetrationTesting #PowerShell #DomainController
https://reconshell.com/adlab-active-directory-lab-environment-to-practice-penetration-testing/
xeca – PowerShell payload generator
#PowerShell #Payload #AppLocker #Malware
https://reconshell.com/powershell-payload-generator/
#PowerShell #Payload #AppLocker #Malware
https://reconshell.com/powershell-payload-generator/
Penetration Testing Tools, ML and Linux Tutorials
xeca - PowerShell payload generator - Penetration Testing Tools, ML and Linux Tutorials
xeca is a project that creates encrypted PowerShell payloads for offensive purposes.
Powershell scripts with 100% AV bypass
#Powershell #AVbypass #AppSec #InfoSec #Malware #Hacking
https://reconshell.com/powershell-scripts-with-100-av-bypass/
#Powershell #AVbypass #AppSec #InfoSec #Malware #Hacking
https://reconshell.com/powershell-scripts-with-100-av-bypass/
Penetration Testing Tools, ML and Linux Tutorials
Powershell scripts with 100% AV bypass - Penetration Testing Tools, ML and Linux Tutorials
This is the Powershell Scripts with 100% AV Bypass Repository (PSSW100AVB). A list of useful Powershell scripts with 100% AV bypass (At the time of