PowerSploit
⚖️ Dual Use · PowerShell
PowerSploit is a collection of Microsoft PowerShell modules that aid penetration testers during all phases of an assessment. Modules include PowerView (AD enumeration), Invoke-Mimikatz (in-memory credential extraction), Get-GPPPassword (Group Policy preference passwords), and dozens more. While the project is archived, it remains one of the most referenced PowerShell offensive toolkits and its techniques are still actively used.
Use Cases
- PowerShell-based Active Directory enumeration (PowerView)
- In-memory credential extraction (Invoke-Mimikatz)
- Group Policy preference password extraction
- Token impersonation and manipulation
- DLL injection and reflective loading
Tags
Details
- Category
- ⚖️ Dual Use
- Language
- PowerShell
- Repository
- PowerShellMafia/PowerSploit
Platforms
Alternatives & Comparisons
More in Dual Use
ProxyChains-ng
CForce any TCP connection through SOCKS4/5 or HTTP proxies. Chain multiple proxies for anonymity.
Socat
CMultipurpose relay tool. Bidirectional data transfer between two data channels — sockets, files, pipes, devices.
ngrok
GoExpose local servers to the internet via secure tunnels. Instant public URLs for localhost services.
Rclone
Gorsync for cloud storage. Sync, copy, and mount 70+ cloud providers. Command-line Swiss army knife for cloud data.
GTFOBins
ShellCurated list of Unix binaries that can be used to bypass security restrictions. Living off the land, documented.
LOLBAS
ShellLiving Off The Land Binaries, Scripts and Libraries for Windows. Documenting every Windows binary with offensive potential.