Open Source PowerShell Software - Page 2

PowerShell Software

Browse free open source PowerShell Software and projects below. Use the toggles on the left to filter open source PowerShell Software by OS, license, language, programming language, and project status.

  • SoftCo: Enterprise Invoice and P2P Automation Software Icon
    SoftCo: Enterprise Invoice and P2P Automation Software

    For companies that process over 20,000 invoices per year

    SoftCo Accounts Payable Automation processes all PO and non-PO supplier invoices electronically from capture and matching through to invoice approval and query management. SoftCoAP delivers unparalleled touchless automation by embedding AI across matching, coding, routing, and exception handling to minimize the number of supplier invoices requiring manual intervention. The result is 89% processing savings, supported by a context-aware AI Assistant that helps users understand exceptions, answer questions, and take the right action faster.
    Learn More
  • Data management solutions for confident marketing Icon
    Data management solutions for confident marketing

    For companies wanting a complete Data Management solution that is native to Salesforce

    Verify, deduplicate, manipulate, and assign records automatically to keep your CRM data accurate, complete, and ready for business.
    Learn More
  • 1
    Sparkle

    Sparkle

    A Windows app to debloat and optimize your PC

    Sparkle is a Windows application that helps you remove Microsoft bloat and apply tweaks, such as disabling telemetry, turning off Copilot, applying NVIDIA optimizations for gaming, and removing OneDrive. It also includes a built-in Winget and Chocolatey app installer, with new apps added frequently. Sparkle features a Utilities page where you can run Disk Cleanup, view your system information, or restart your graphics drivers. SUPPORT THE DEVELOPER: https://buymeacoffee.com/dogecraft
    Leader badge
    Downloads: 357 This Week
    Last Update:
    See Project
  • 2
    Scoop Installer

    Scoop Installer

    A command-line installer for Windows

    Scoop is a command-line installer for Windows. If you have built software that you would like others to use, Scoop is an alternative to building an installer (like MSI or InnoSetup). You just need to compress your app to a .zip file and provide a JSON manifest that describes how to install it. Scoop downloads and manages packages in a portable way, keeping them neatly isolated in ~\scoop. It won't install files outside its home, and you can place a Scoop installation wherever you like. For terminal applications, Scoop creates shims, a kind of command-line shortcut, inside the ~\scoop\shims folder, which is accessible in the PATH. For graphical applications, Scoop creates program shortcuts in a dedicated Start menu folder, called 'Scoop Apps'. This way, packages are always cleanly uninstalled and you can be sure what tools are currently in your PATH and in your Start menu.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 3
    MemProcFS Analyzer

    MemProcFS Analyzer

    Automated Forensic Analysis of Windows Memory Dumps for DFIR

    MemProcFS-Analyzer is a forensic analysis toolset that builds on the MemProcFS virtual filesystem to make volatile memory artefacts easier to browse and interpret. By exposing process memory, kernel objects, and derived artifacts as regular files, the framework lets analysts use familiar filesystem operations and standard tools (editors, grep, diff) to explore memory snapshots. The Analyzer layer adds higher-level parsing and extraction routines—for example, carving strings, locating injected modules, enumerating handles, or reconstructing network sockets—so investigators can go from raw memory to actionable evidence more quickly. It emphasizes automation and reproducibility: parsers can be chained, results exported, and reports templated to fit incident workflows. Because memory contains transient but critical traces of running malware or misuse, the project focuses on robust parsing in the face of corruption and mismatched OS versions.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 4
    Offensive Reverse Shell

    Offensive Reverse Shell

    Collection of reverse shells for red team operations

    The Offensive Reverse Shell Cheat Sheet is a compilation of reverse shell payloads useful for red team operations and penetration testing. It provides ready-to-use code snippets in various programming languages, facilitating the establishment of reverse shells during security assessments.​
    Downloads: 16 This Week
    Last Update:
    See Project
  • Collect! is a highly configurable debt collection software Icon
    Collect! is a highly configurable debt collection software

    Everything that matters to debt collection, all in one solution.

    The flexible & scalable debt collection software built to automate your workflow. From startup to enterprise, we have the solution for you.
    Learn More
  • 5
    Bloatbox

    Bloatbox

    Remove Bloatwares from Windows 10

    BloatBox is a lightweight toolkit that helps users identify and remove unnecessary or undesired components from Windows installations. It typically exposes a curated list of preinstalled apps and services often considered “bloat” and offers scripted ways to uninstall or disable them, streamlining a system for performance, privacy, or reduced clutter. The project aims to be user-friendly: rather than running raw command lines, it organizes actions into named tasks and explains consequences so users can choose conservative or aggressive cleanup profiles. It often includes safeguards like dry-run modes, restore points, or instructions for reinstalling removed components to avoid accidental breakage. For those managing multiple machines, BloatBox accelerates getting a consistent, lean image ready for deployment or personal use. The focus is on practical trade-offs—removing what’s unnecessary while keeping the system stable and manageable.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 6
    BashBunny Payloads

    BashBunny Payloads

    The Official Bash Bunny Payload Repository

    This repository is a curated collection of payload scripts and examples for the Hak5 Bash Bunny device, a programmable USB attack platform. Payloads demonstrate how the device can emulate human interface devices (keyboard/mouse), Ethernet adapters, serial gadgets, or mass storage to automate complex workflows once plugged into a host. The collection ranges from benign administrative automation to offensive security demonstrations used in penetration testing, showcasing patterns like keystroke automation, reverse shells, credential capture (for lab use), and lateral transport techniques. Each payload typically includes a payload.txt control file with stages and configurable parameters so operators can adapt behavior to different targets. Because the device and its payloads are powerful, the repository emphasizes responsible use—training, red-team engagements with authorization, and awareness of legal/ethical boundaries.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 7
    BloodHound Legacy

    BloodHound Legacy

    Six Degrees of Domain Admin

    BloodHound Legacy is the deprecated open‑source version of the BloodHound Active Directory attack path analysis tool. It uses graph theory to model and visualize privileged relationships in AD, Entra ID, and Azure environments. Security professionals use it to enumerate domain privilege escalation paths, misconfigurations, and attack surfaces in corporate networks
    Downloads: 13 This Week
    Last Update:
    See Project
  • 8
    Windows Super God Mode

    Windows Super God Mode

    Creates shortcuts to virtually every special location or action built

    This project packages a set of Windows tweaks, shortcuts, and convenience scripts that surface many of the OS’s hidden settings and advanced controls into a single, easy-to-use place. It automates creation of “God Mode” folders and other control-panel shortcuts, removes the need to manually hunt through layers of Settings or the Registry, and often bundles helper scripts for common maintenance tasks. The intent is to put power-user features—tweaks for privacy, appearance, power management, and system behavior—within quick reach so administrators and enthusiasts can configure machines consistently. Because many of the actions touch system settings, the collection emphasizes clear instructions and reversible steps so users can roll back changes if needed. It’s valuable for technicians who want a reproducible baseline for customizing Windows installs, or for home users curious about otherwise-obscure controls.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 9
    Tookie-OSINT

    Tookie-OSINT

    Username OSINT tool for discovering accounts across many websites

    Tookie-OSINT is an open source intelligence tool designed to help security researchers, ethical hackers, and investigators discover online accounts associated with a specific username. It automates the process of searching for usernames across multiple websites, making it easier to identify a person's presence on different platforms. By entering a target username, Tookie-OSINT scans a list of supported sites and checks whether the username exists on those platforms. This approach removes the need for manual checks and significantly speeds up OSINT investigations. It is similar in concept to tools such as Sherlock, focusing on identifying user profiles across social media and other online services. Tookie-OSINT includes both command-line and optional web interface functionality, giving users flexible ways to run scans and analyze results. Tookie-OSINT was created to help beginners and aspiring security professionals learn about OSINT techniques.
    Downloads: 12 This Week
    Last Update:
    See Project
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 10
    Commando VM

    Commando VM

    Complete Mandiant Offensive VM (Commando VM)

    Commando VM (by Mandiant) is a Windows-based offensive security / red-team distribution built to turn a fresh Windows installation into a fully featured penetration testing environment. It provides an automated installer (PowerShell script) that uses Chocolatey, Boxstarter, and MyGet package feeds to download, install, and configure dozens (100+ / 170+ depending on version) of offensive, fuzzing, enumeration, and exploitation tools. The idea is to spare testers the repetitive work of hand-installing dozens of windows tools, dependencies, and configurations. Commando VM supports customization of its installation profile (you can pick subsets of tools), includes support for WSL/Kali integration, and is intended to be used in a VM to facilitate snapshot recovery and test isolation.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 11
    Desktop Commander MCP

    Desktop Commander MCP

    AI-powered MCP server for desktop file and terminal automation

    Desktop Commander MCP is an advanced Model Context Protocol server designed to extend AI assistants with direct control over a user’s local machine, including the file system and terminal. It integrates with clients like Claude Desktop to enable AI-driven workflows such as editing files, executing commands, and automating development tasks from a single conversational interface. Desktop Commander MCP builds on top of an MCP filesystem server and enhances it with powerful search, replace, and code editing capabilities tailored for real-world development environments. It allows users to run terminal commands with streaming output, manage long-running processes, and even execute code in memory without saving files. It also supports working with structured and document formats such as Excel, PDF, and DOCX, enabling AI to read, modify, and generate these files directly.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 12
    Penetration Testing Tools

    Penetration Testing Tools

    A collection of more than 170+ tools, scripts, cheatsheets

    Penetration-Testing-Tools is a curated collection of tools, scripts, cheatsheets and reference materials assembled to help security researchers, red-teamers, and students perform hands-on penetration testing across multiple domains. The repository groups resources by discipline — reconnaissance, web application testing, network exploitation, privilege escalation, post-exploitation and reporting — so users can quickly find relevant utilities and walkthroughs. Many entries include short usage notes, common command examples, and links to upstream projects or writeups, turning the repo into both a toolbox and a practical learning library. The collection emphasizes tooling that is easy to run in lab environments and often points to small scripts and one-file utilities that accelerate common tasks like service discovery, credential harvesting, or privilege checks.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 13
    Easy GPU PV

    Easy GPU PV

    A Project dedicated to making GPU Partitioning on Windows easier

    Easy-GPU-PV is an open-source project that automates the relatively complex steps required to set up GPU Paravirtualization (GPU-PV) on Windows Hyper-V, letting you partition a physical GPU and assign slices to virtual machines for low-latency remote use. It creates and installs a Windows VM, copies the necessary GPU-PV driver files into the VM, and helps install Parsec (an ultra-low-latency remote-desktop client) so you can connect to the VM at high framerates. The repo is practical and script-driven: the author provides PowerShell scripts (PreChecks.ps1, CopyFilesToVM.ps1, Update-VMGpuPartitionDriver.ps1, etc.) plus configuration values and an unattended install template to minimize manual steps. The README documents hardware and OS prerequisites (Windows 10 20H1+/Windows 11 Pro/Enterprise/Education, matched host/VM versions, virtualization and Hyper-V enabled, recent GPU drivers, and supported GPUs.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 14
    Generative AI for Beginners (Version 3)

    Generative AI for Beginners (Version 3)

    21 Lessons, Get Started Building with Generative AI

    Generative AI for Beginners is a 21-lesson course by Microsoft Cloud Advocates that teaches the fundamentals of building generative AI applications in a practical, project-oriented way. Lessons are split into “Learn” modules for core concepts and “Build” modules with hands-on code in Python and TypeScript, so you can jump in at any point that matches your goals. The course covers everything from model selection, prompt engineering, and chat/text/image app patterns to secure development practices and UX for AI. It also walks through modern application techniques such as function calling, RAG with vector databases, working with open source models, agents, fine-tuning, and using SLMs. Each lesson includes a short video, a written guide, runnable samples for Azure OpenAI, the GitHub Marketplace Model Catalog, and the OpenAI API, plus a “Keep Learning” section for deeper study.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 15
    Winget-AutoUpdate

    Winget-AutoUpdate

    WAU daily updates apps as system and notify connected users

    Winget-AutoUpdate provides automation around Microsoft’s winget package manager to keep installed applications current without manual intervention. It typically wraps winget upgrade invocations into scheduled tasks, CI jobs, or simple scripts that can run on developer workstations and servers to apply available updates in a controlled way. Implementations often add logging, selective filtering (so only safe or allowed packages are updated), and dry-run reporting so admins can vet changes before deployment. For organizations, it’s a pragmatic bridge between ad-hoc desktop maintenance and a more formal patching pipeline—especially useful where modern app stores aren’t the single source of truth. The project also tends to include helpful utilities for generating update reports, creating change tickets, or rolling back problematic updates. Ultimately, it reduces the operational cost of keeping diverse Windows apps reasonably up to date.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 16
    winget-pkgs

    winget-pkgs

    The Microsoft community Windows Package Manager manifest repository

    The winget-pkgs repository is the community-maintained manifest collection for the Windows Package Manager (winget), serving as the default, upstream source of installable application manifests used by the winget client. It contains tens of thousands of manifest files (organized under a manifests/ folder) plus schema, validation, CI pipelines, and tooling to build, test, and publish packages so users can install software with a single command. The repo enforces contribution processes (including a Contributor License Agreement flow for many contributors), automated validation checks, and publishing pipelines so manifests meet format, checksum, and licensing expectations before becoming available to users. Maintainers document manifest authoring, testing, and request workflows, and the repository requires installers to be packaged as supported installer formats (MSIX, MSI, APPX, or executable installers), with script-based installers and fonts noted as unsupported.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 17
    AI File Sorter

    AI File Sorter

    Local AI file organization with categorization and rename suggestions

    AI File Sorter is a cross-platform desktop application that uses AI (local LLMs run on your computer) to organize files and suggest meaningful file names based on real content, not just filenames or extensions. The app can analyze images locally and propose descriptive rename suggestions (for example, IMG_2048.jpg → clouds_over_lake.jpg). It can also analyze document text to improve categorization and renaming. Supported formats include PDF, DOCX, XLSX, PPTX, ODT, ODS, ODP, and common text files. For supported audio and video files, AI File Sorter can read embedded metadata (such as ID3, Vorbis, and MP4 tags) to suggest normalized names like year_artist_album_title.ext. AI analysis runs read-only, and all suggestions must be reviewed before being applied. AI File Sorter can run fully offline using local models like Mistral or LLaMA, so files and metadata stay on your device unless you configure a remote endpoint.
    Downloads: 233 This Week
    Last Update:
    See Project
  • 18
    Re-image the Windows

    Re-image the Windows

    These scripts to configure a ready-to-use Windows environment

    Reimage-Windows is a repo for automating and documenting the process of reinstalling or “reimaging” Windows, turning what is normally a manual, error-prone chore into a repeatable pipeline. It bundles scripts, configuration, and notes so that after a clean Windows install you can run one or two commands to get your environment back. The project is aimed at people who rebuild machines often, maintain several PCs, or just want a disaster-recovery style setup for Windows. It encourages treating OS setup like code: versioned, reviewable, and improvable over time. Because it’s public, you can see exactly what’s being installed and customize it for your own drivers, packages, and tools. The end goal is a faster path from “blank Windows” to “fully set up workstation” with minimal clicks.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 19
    Bear Stone Smart Home

    Bear Stone Smart Home

    Custom Home Assistant configuration with automations and scripts setup

    Bear Stone Smart Home contains a personalized configuration setup for Home Assistant, an open source home automation platform. It defines how various smart home devices, services, and integrations are organized and controlled within a single environment. It includes configuration files that manage entities such as lights, sensors, switches, and media devices, enabling centralized automation and monitoring. It demonstrates how to structure Home Assistant YAML files for scalability and maintainability in a real-world deployment. Bear Stone Smart Home also showcases custom automations and scripts designed to improve convenience, energy efficiency, and overall smart home behavior. Additionally, it may include examples of dashboards and user interface customization to enhance usability and visualization of home data. Overall, it serves as a practical reference for building and refining a tailored Home Assistant setup.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 20
    PowerSploit PowerShell

    PowerSploit PowerShell

    A PowerShell Post-Exploitation Framework

    PowerSploit is a collection of PowerShell modules that historically served as a toolkit for post-exploitation tasks, red-team exercises, and offensive-security research—covering areas like reconnaissance, lateral movement, persistence, and situational awareness. The repository bundles many focused scripts: code to enumerate system and Active Directory information, payload generation helpers, in-memory execution utilities, and modules to interact with credentials and services. Because the modules can be used to both demonstrate weaknesses and to exploit them, the project is typically referenced in threat emulation, penetration testing, and defensive research to understand attacker capabilities. Responsible use centers on authorized assessments: defenders use the toolkit to validate monitoring and detection, while operators apply its lessons to patch, harden, and instrument systems.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 21
    Win10 Initial Setup Script

    Win10 Initial Setup Script

    PowerShell script for automation of routine tasks

    The Win10 Initial Setup Script is a community-driven automation script to apply system tweaks, optimizations, and privacy settings to fresh Windows 10 installations. It bundles configurable modifications—disabling telemetry, configuring power plans, uninstalling bundled apps, setting registry tweaks, and adjusting updates—to align the system with power users’ preferences. Because many base Windows configurations ship with defaults suboptimal for performance or privacy, the script gives a reproducible mechanism to apply consistent settings across installs. The script is modular: users can enable or disable individual sections depending on need or sensitivity. Logging and dry-run options let users preview changes before committing them. As a reproducibility tool, it helps users maintain baseline configurations across hardware setups without manually clicking through deep settings panels.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 22
    Winfetch

    Winfetch

    A command-line system information utility written in PowerShell

    Winfetch is a PowerShell‑based, command-line system information utility for Windows, inspired by tools like Neofetch. It displays OS, hardware, and installed software data alongside ASCII or logo art, optimized for aesthetic screenshots or user status displays. Highly customizable with minimal footprint, it’s ideal for personalization and visual system summaries.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 23
    BadUSB

    BadUSB

    Flipper Zero badusb payload library

    This project explores USB device emulation attacks—commonly called BadUSB—by demonstrating how commodity USB hardware can impersonate keyboards, network adapters, or storage devices to perform scripted actions on a host. It typically contains firmware examples, payloads, and explanations showing how a device presenting as a Human Interface Device (HID) can inject keystrokes, open shells, or orchestrate data exfiltration when plugged into a machine. The codebase is frequently intended for security research and defensive testing: defenders and red teams use it to validate endpoint controls, USB whitelisting, and user training. Due to the dual-use nature of such techniques, responsible repositories emphasize lab-only experiments, consent-based testing, and mitigations like disabling autorun, enforcing device policies, and using endpoint detection.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24
    Everywhere

    Everywhere

    Context-aware desktop AI assistant that understands screen content

    Everywhere is a context-aware desktop AI assistant designed to interact directly with the content displayed on a user’s screen. It distinguishes itself from traditional AI tools by eliminating the need for manual input methods such as copying text or taking screenshots, instead allowing users to invoke assistance instantly through a shortcut. It can analyze on-screen information in real time and provide contextual responses, making it useful for tasks like troubleshooting errors, summarizing articles, translating text, and refining written content. It integrates with multiple large language model providers and supports various tools, enabling flexible and extensible AI-powered workflows. Everywhere features a modern design with interactive elements such as markdown rendering, keyboard shortcuts, and voice input capabilities. Additionally, the project emphasizes seamless workflow integration by operating alongside existing applications rather than requiring users to switch.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 25
    GOAD (Game of Active Directory)

    GOAD (Game of Active Directory)

    game of active directory

    GOAD (Gather Open Attack Data) is a security reconnaissance framework for collecting, enriching, and visualizing open-source intelligence (OSINT) around hosts, domains, and certificates. It automates queries to certificate transparency logs, passive DNS, subdomain enumeration, web endpoints, and other public threat feeds. The tool aggregates results into structured formats and can produce interactive graphs to highlight relationships between entities (e.g. domain → IP → cert → ASN). Analysts can filter, cluster, and explore these relationships to identify infrastructure patterns, potential subdomains, or attack surfaces. Integrations may include metadata like geolocation, WHOIS, and risk scoring to prioritize leads. GOAD helps teams transition from fragmented OSINT tools to a unified reconnaissance dashboard where exploration and filtering are first-class.
    Downloads: 5 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB