# Tools

- [Nishang](https://infra.newerasec.com/infrastructure-testing/tools/nishang.md): Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of pene
- [UACME](https://infra.newerasec.com/infrastructure-testing/tools/uacme.md): Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor.
- [Bypass-UAC](https://infra.newerasec.com/infrastructure-testing/tools/bypass-uac.md): Bypass-UAC provides a framework to perform UAC bypasses based on auto elevating IFileOperation COM object method calls.
- [MSBuildAPICaller](https://infra.newerasec.com/infrastructure-testing/tools/msbuildapicaller.md): MSBuild Without MSBuild.exe
- [Impacket](https://infra.newerasec.com/infrastructure-testing/tools/impacket.md)
- [SharpPersist](https://infra.newerasec.com/infrastructure-testing/tools/sharppersist.md): Windows persistence toolkit written in C#
- [Terminals](https://infra.newerasec.com/infrastructure-testing/tools/terminals.md): Different type of terminals and shells
- [IP Calculation](https://infra.newerasec.com/infrastructure-testing/tools/ip-calculation.md): Useful tools to calculate subnets and ranges
- [pwsh](https://infra.newerasec.com/infrastructure-testing/tools/pwsh.md): powershell on kali ( = Linux)
- [psTools / Sysinternals](https://infra.newerasec.com/infrastructure-testing/tools/pstools-sysinternals.md): PsTools is a suite of tools developed by Sysinternals (now Microsoft). They're a great complement to any pen test, and many of my Nmap scripts are loosely based on them.
- [Unlock applocker](https://infra.newerasec.com/infrastructure-testing/tools/unlock-applocker.md): Microsoft Applocker evasion tool
- [enum4linux](https://infra.newerasec.com/infrastructure-testing/tools/enum4linux.md)
- [Bloodhound](https://infra.newerasec.com/infrastructure-testing/tools/bloodhound.md)
- [aclpwn](https://infra.newerasec.com/infrastructure-testing/tools/bloodhound/aclpwn.md): Aclpwn.py is a tool that interacts with BloodHound to identify and exploit ACL based privilege escalation paths.
- [mitm6](https://infra.newerasec.com/infrastructure-testing/tools/mitm6.md)
- [Enyx](https://infra.newerasec.com/infrastructure-testing/tools/enyx.md): Enyx SNMP IPv6 Enumeration Tool
- [nfsshell](https://infra.newerasec.com/infrastructure-testing/tools/nfsshell.md): Userspace NFS client shell
- [PowerUpSQL](https://infra.newerasec.com/infrastructure-testing/tools/powerupsql.md)
- [Metasploit](https://infra.newerasec.com/infrastructure-testing/tools/metasploit.md)
- [msfvenom](https://infra.newerasec.com/infrastructure-testing/tools/metasploit/msfvenom.md): MsfVenom is a Metasploit standalone payload generator as a replacement for msfpayload and msfencode.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://infra.newerasec.com/infrastructure-testing/tools.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
