0xNinjaCyclone / PowerLoad3rLinks
Malicious powershell scripts loader designed to avoid detection.
☆50Updated 2 years ago
Alternatives and similar repositories for PowerLoad3r
Users that are interested in PowerLoad3r are comparing it to the libraries listed below
Sorting:
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆167Updated 3 months ago
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆67Updated 3 weeks ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆201Updated 8 months ago
- .bin file to shellcode convertor☆38Updated 11 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated last month
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆98Updated this week
- Havoc C2 profile generator☆90Updated 8 months ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆98Updated 3 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆128Updated 5 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 4 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆51Updated this week
- ☆177Updated 10 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆69Updated last month
- ☆88Updated 5 months ago
- Evasive Golang Loader☆131Updated 10 months ago
- Lateral Movement☆124Updated last year
- ☆107Updated 4 months ago
- a port of privkit bof for havoc☆23Updated last year
- Chrome browser extension-based Command & Control☆147Updated 4 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆152Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆155Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆122Updated 8 months ago
- ☆108Updated 3 months ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 3 years ago