0xNinjaCyclone / PowerLoad3rLinks
Malicious powershell scripts loader designed to avoid detection.
☆50Updated 2 years ago
Alternatives and similar repositories for PowerLoad3r
Users that are interested in PowerLoad3r are comparing it to the libraries listed below
Sorting:
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Evasive Golang Loader☆132Updated 11 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated 2 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆168Updated 4 months ago
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- Havoc C2 profile generator☆91Updated 8 months ago
- .bin file to shellcode convertor☆38Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆98Updated 3 years ago
- Chrome browser extension-based Command & Control☆152Updated last week
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆27Updated last year
- Lateral Movement☆124Updated last year
- ☆182Updated 11 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆129Updated 5 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆72Updated 2 weeks ago
- Small project to facilitate creation of .lnk payloads☆70Updated 2 years ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 5 months ago
- 「💀」Proof of concept on BYOVD attack☆161Updated 7 months ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 3 years ago
- Command and Control (C2) framework☆126Updated last month
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- ☆180Updated last month
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆72Updated 2 months ago
- C# havoc implant☆101Updated 2 years ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆99Updated this week
- My implementation of the GIUDA project in C++☆185Updated last year
- A shellcode injection tool showcasing various process injection techniques☆137Updated last year
- a port of privkit bof for havoc☆23Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆202Updated 8 months ago