Add some security <3

- PowerForensics
- PowerSploit
- PowerShellEmpire
- PSReflect
This commit is contained in:
Sergei Vorobev 2016-09-17 15:37:42 -07:00 committed by GitHub
parent bd931e4f36
commit c7847969da

View File

@ -60,6 +60,11 @@ Inspired by the [awesome](https://github.com/sindresorhus/awesome) list thing.
- [File System Security](https://gallery.technet.microsoft.com/scriptcenter/1abd77a5-9c0b-4a2b-acef-90dbb2b84e85) - Allows a much easier management of permissions on files and folders. - [File System Security](https://gallery.technet.microsoft.com/scriptcenter/1abd77a5-9c0b-4a2b-acef-90dbb2b84e85) - Allows a much easier management of permissions on files and folders.
- [PowerShellArsenal](https://github.com/mattifestation/PowerShellArsenal) - A module used to aid a reverse engineer. - [PowerShellArsenal](https://github.com/mattifestation/PowerShellArsenal) - A module used to aid a reverse engineer.
- [PowerTools](https://github.com/Veil-Framework/PowerTools) - Collection of projects with a focus on offensive operations. - [PowerTools](https://github.com/Veil-Framework/PowerTools) - Collection of projects with a focus on offensive operations.
- [PowerForensics](https://github.com/Invoke-IR/PowerForensics) - popular live disk forensics platform for windows.
- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit) - post-exploitation framework.
- [PowerShellEmpire](https://github.com/PowerShellEmpire/Empire) - post-exploitation agent.
- [PSReflect](https://github.com/mattifestation/PSReflect) - easily define in-memory enums, structs, and Win32 functions in PowerShell.
Useful for attacks, [example](https://github.com/FuzzySecurity/PowerShell-Suite/tree/master/Bypass-UAC)
### Themes ### Themes