There are 2 repositories under post-exploitation-powershell topic.
Awesome tools to exploit Windows !
Powershell modules and commands that come in handy for pentests and red team assessments.
Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.