Malicious powershell scripts loader designed to avoid detection.
☆61Jun 16, 2023Updated 2 years ago
Alternatives and similar repositories for PowerLoad3r
Users that are interested in PowerLoad3r are comparing it to the libraries listed below
Sorting:
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Generate FUD backdoors☆262Mar 17, 2023Updated 2 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆44Updated this week
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆52Jul 22, 2021Updated 4 years ago
- A multi web security purposes tool☆47Feb 23, 2026Updated last week
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆46Feb 23, 2026Updated last week
- Exploits written while preparing for the OSED exam☆26Apr 30, 2024Updated last year
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Nov 16, 2025Updated 3 months ago
- BypassCredGuard CS BOF☆49Jan 23, 2025Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- shell code example☆68Dec 12, 2025Updated 2 months ago
- ☆13Mar 28, 2024Updated last year
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques and used by Patchwork group.☆833Jul 2, 2024Updated last year
- C++ Reflective Assembly Loader☆31Mar 7, 2025Updated 11 months ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆29Oct 2, 2025Updated 5 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆283Apr 6, 2025Updated 10 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- ☆12Apr 26, 2022Updated 3 years ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆11Sep 2, 2020Updated 5 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- ☆16Jun 15, 2025Updated 8 months ago
- Shellcode loader generator with multiples features☆508Dec 31, 2024Updated last year
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 11 months ago
- Most Responder's configuration power in your hand.☆54Jan 19, 2025Updated last year
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago