Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      PowerShell

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement.
          PoshC2 is primarily written in Python3 and follows a modular format to enable users to add their own modules and tools, allowing an extendible and flexible C2 framework. Out-of-the-box PoshC2 comes PowerShell/C# and Python3 implants with payloads written in PowerShell v2 and v4, C++ and C# source code, a variety of executables, DLLs and raw shellcode in addition to a Python3 payload. These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX.
          Other notable features of PoshC2 include:
              Highly configurable payloads, including default beacon times, jitter, kill dates, user agents and more.
              A large number of payloads generated out-of-the-box which are frequently updated and maintained to bypass common Anti-Virus products.
              Auto-generated Apache Rewrite rules for use in a C2 proxy, protecting your C2 infrastructure and maintaining good operational security.
              A modular format allowing users to create or edit C#, PowerShell or Python3 modules which can be run in-memory by the Implants.
              Notifications on receiving a successful Implant, such as via text message or Pushover.
              A comprehensive and maintained contextual help and an intelligent prompt with contextual auto-completion, history and suggestions.
              Fully encrypted communications, protecting the confidentiality and integrity of the C2 traffic even when communicating over HTTP.
              Client/Server format allowing multiple team members to utilise a single C2 server.
              Extensive logging. Every action and response is timestamped and stored in a database with all relevant information such as user, host, implant number etc. In addition to this the C2 server output is directly logged to a separate file.
          Changelog v7.2
              New Report template & style
              Updates to support Slack Notifications
              Add ability to chain SharpPBind implants to an arbitrary depth
              Fix Sharpsocks on Docker
              Misc minor fixes

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Remote shell Web Server

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Features
              Connection is encrypted using random RSA + AES key
              Multiple clients support
              Execute shell commands
              Download/Upload files
              Take screenshot
              Cross platform

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Makeing web based Android Keylogger & Android Reverse Shell with netcat configuration.
          Here is the source code of an android application which is help to hack victim Mobile Shell connection via netcat & capture victim key strokes via http server in one Application.

          Hidden Content
          Give reaction to this post to see the hidden content.