0xShaolin / CMD_BypassLinks
Is command prompt blocked on your school/work computers? Here is an easy fix!
☆21Updated 6 years ago
Alternatives and similar repositories for CMD_Bypass
Users that are interested in CMD_Bypass are comparing it to the libraries listed below
Sorting:
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆56Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Updated 6 years ago
- ☆25Updated 7 years ago
- Miscellaneous for various things☆21Updated last year
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 6 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago
- Penetration Test / Read Team - C# tools repository☆55Updated 4 years ago
- A C# DLL to Dump LSA Secrets☆58Updated 8 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Updated 5 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Random code snippets☆11Updated 2 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆82Updated 7 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 6 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Updated 8 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Updated 4 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 7 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 8 years ago
- ☆43Updated 6 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Updated 2 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago