Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 6bf73a7

Browse files
committed
List Update
1 parent bf109b2 commit 6bf73a7

File tree

1 file changed

+16
-1
lines changed

1 file changed

+16
-1
lines changed

README.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,15 +56,24 @@ pwnd
5656
* TDL (Turla Driver Loader). Driver loader for bypassing Windows x64 Driver Signature Enforcement:
5757
* https://github.com/hfiref0x/TDL
5858

59+
* Ebowla, framework for Making Environmental Keyed Payloads:
60+
* https://github.com/Genetic-Malware/Ebowla
61+
5962
PowerShell
6063
----------
6164
* PowerSploit - A PowerShell Post-Exploitation Framework:
6265
* https://github.com/PowerShellMafia/PowerSploit
6366

6467
* PowerShellArsenal, PowerShell Module Dedicated to Reverse Engineering:
6568
* https://github.com/mattifestation/PowerShellArsenal
69+
70+
* Empire, post-exploitation framework:
71+
* https://github.com/powershellempire/empire
72+
73+
* PowerShell Empire Web Interface using the REST API interface:
74+
* https://github.com/interference-security/empire-web
6675

67-
* PowerShell - Live disk forensics platform:
76+
* PowerShell live disk forensics platform:
6877
* https://github.com/Invoke-IR/PowerForensics
6978

7079
* PowerMemory:
@@ -81,9 +90,15 @@ PowerShell
8190

8291
* Powershell to CodeExecution and ProcessInjection:
8392
* https://github.com/3gstudent/Code-Execution-and-Process-Injection
93+
94+
* PoshRat, PowerShell Reverse HTTP(s) Shell:
95+
* https://github.com/subTee/PoshRat
8496

8597
* p0wnedShell, PowerShell Runspace Post Exploitation Toolkit:
8698
* https://github.com/Cn33liz/p0wnedShell
99+
100+
* PSAttack, a portable console aimed at making pentesting with PowerShell a little easier:
101+
* https://github.com/jaredhaight/PSAttack
87102

88103
* OutlookPersistence:
89104
* https://github.com/enigma0x3/OutlookPersistence

0 commit comments

Comments
 (0)