Awesome tools to exploit Windows !
-
Updated
May 21, 2022
Awesome tools to exploit Windows !
Powershell modules and commands that come in handy for pentests and red team assessments.
Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.
后渗透阶段在域内利用 ATA 进行信息侦查(Abusing ATA for domain reconnaissance during the post-exploitation stage.)
Search for interesting data in network shares or drives
Add a description, image, and links to the post-exploitation-powershell topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation-powershell topic, visit your repo's landing page and select "manage topics."