Powerexploit Post Exploitation module for Pentesters & Hackers
Powerexploit Post Exploitation module for Pentesters & Hackers

Powerexploit: Post Exploitation module for Pentesters & Hackers

Powerexploit is a pentesting module contains scanning, remoting, post exploitation functionality, designed with the help of powershell scripting & .net functions.

Tabla de Contenido

Vision

write-host “Hack with Powerexploit the Operating Systems”
write-host -fore green “Inspired by Powersploit”

Steps

  • Run the install.ps1 file
.\install.ps1
  • Import the Powerexploit Module From Powerexploit folder
import-module -name Powerexploit.psm1
  • Get functions of Powerexploit
Get-command -module Powerexploit
  • Then Run any of functions from Powerexploit
Start-encodedcommand
Demo Powerexploit
Demo Powerexploit

Contribution

If you want to contribute to this to this module , So You can contribute in following ways:

  • Report bugs
  • Add some code
  • Give suggestions to make it better
  • Fix issues & submit a pull request

Mi Carro Close (×)

Tu carrito está vacío
Ver tienda