Lists (20)
Sort Name ascending (A-Z)
- All languages
- ASP
- Assembly
- AutoHotkey
- AutoIt
- Ballerina
- Batchfile
- Boo
- C
- C#
- C++
- CMake
- CSS
- Classic ASP
- Clojure
- CodeQL
- CoffeeScript
- Common Lisp
- Crystal
- D
- Dart
- Dhall
- Dockerfile
- Elixir
- Elm
- Emacs Lisp
- Erlang
- Fantom
- FreeBASIC
- FreeMarker
- GDScript
- Gleam
- Go
- HCL
- HTML
- Haskell
- Haxe
- Inno Setup
- JSON
- Java
- JavaScript
- Jinja
- Jsonnet
- Julia
- Jupyter Notebook
- Just
- Kaitai Struct
- Kotlin
- LLVM
- Less
- Logos
- Lua
- MDX
- Makefile
- Markdown
- Meson
- Mojo
- MoonBit
- MoonScript
- NSIS
- Nim
- Nix
- OCaml
- Objective-C
- Objective-C++
- Odin
- PHP
- PLpgSQL
- POV-Ray SDL
- Pascal
- Pawn
- Perl
- PowerShell
- Prolog
- PureBasic
- Python
- QML
- QMake
- R
- Reason
- Red
- Rich Text Format
- Riot
- Roff
- Ruby
- Rust
- SCSS
- SWIG
- Scala
- Shell
- Smali
- Smarty
- Starlark
- Stylus
- Svelte
- Swift
- TSQL
- TeX
- TypeScript
- Typst
- V
- VBA
- VBScript
- Vala
- Vim Script
- Visual Basic
- Visual Basic .NET
- Visual Basic 6.0
- Vue
- XSLT
- YARA
- Zig
- sed
Starred repositories
A command-line installer for Windows.
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.
My musings with PowerShell
BadBlood by @davidprowe, Secframe.com, fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.…
A simple, fun, and interactive way to learn the PowerShell language through Pester unit testing.
Socks proxy, and reverse socks server using powershell.
A scoop bucket for installing nerd fonts
Forward local or remote tcp ports through SMB pipes.
lateral movement techniques that can be used during red team exercises
This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR in context of download cradle detections.
Source code for modules placed in PowerShell Gallery and on my https://doitpshway.com blog.