56
56
* TDL (Turla Driver Loader). Driver loader for bypassing Windows x64 Driver Signature Enforcement:
57
57
* https://github.com/hfiref0x/TDL
58
58
59
+ * Ebowla, framework for Making Environmental Keyed Payloads:
60
+ * https://github.com/Genetic-Malware/Ebowla
61
+
59
62
PowerShell
60
63
----------
61
64
* PowerSploit - A PowerShell Post-Exploitation Framework:
62
65
* https://github.com/PowerShellMafia/PowerSploit
63
66
64
67
* PowerShellArsenal, PowerShell Module Dedicated to Reverse Engineering:
65
68
* https://github.com/mattifestation/PowerShellArsenal
69
+
70
+ * Empire, post-exploitation framework:
71
+ * https://github.com/powershellempire/empire
72
+
73
+ * PowerShell Empire Web Interface using the REST API interface:
74
+ * https://github.com/interference-security/empire-web
66
75
67
- * PowerShell - Live disk forensics platform:
76
+ * PowerShell live disk forensics platform:
68
77
* https://github.com/Invoke-IR/PowerForensics
69
78
70
79
* PowerMemory:
@@ -81,9 +90,15 @@ PowerShell
81
90
82
91
* Powershell to CodeExecution and ProcessInjection:
83
92
* https://github.com/3gstudent/Code-Execution-and-Process-Injection
93
+
94
+ * PoshRat, PowerShell Reverse HTTP(s) Shell:
95
+ * https://github.com/subTee/PoshRat
84
96
85
97
* p0wnedShell, PowerShell Runspace Post Exploitation Toolkit:
86
98
* https://github.com/Cn33liz/p0wnedShell
99
+
100
+ * PSAttack, a portable console aimed at making pentesting with PowerShell a little easier:
101
+ * https://github.com/jaredhaight/PSAttack
87
102
88
103
* OutlookPersistence:
89
104
* https://github.com/enigma0x3/OutlookPersistence
0 commit comments