0xNinjaCyclone / PowerLoad3r
Malicious powershell scripts loader designed to avoid detection.
☆51Updated last year
Alternatives and similar repositories for PowerLoad3r:
Users that are interested in PowerLoad3r are comparing it to the libraries listed below
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- Inject RDPThief into memory with PowerShell.☆63Updated 3 months ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆157Updated last month
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆55Updated 3 weeks ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆61Updated last week
- .bin file to shellcode convertor☆34Updated 10 months ago
- a port of privkit bof for havoc☆23Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆95Updated 3 years ago
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆88Updated last week
- ☆154Updated 9 months ago
- Ghosting-AMSI☆159Updated 2 weeks ago
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆92Updated last month
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆48Updated 2 months ago
- ☆85Updated 3 months ago
- Havoc C2 profile generator☆78Updated 6 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆115Updated 3 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Adversary Emulation Framework☆98Updated 9 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated last year
- TeamServer and Client of Exploration Command and Control Framework☆125Updated this week
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆143Updated 2 months ago
- 「💀」Proof of concept on BYOVD attack☆158Updated 5 months ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 3 years ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆121Updated 7 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆198Updated 6 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆44Updated last year