The command prompt has been disabled by your administrator
☆42May 18, 2023Updated 2 years ago
Alternatives and similar repositories for cmd-bypass
Users that are interested in cmd-bypass are comparing it to the libraries listed below
Sorting:
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆16Jul 27, 2024Updated last year
- Utilizng an MCP Server to communicate with your C2☆86May 15, 2025Updated 9 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- Linker for Beacon Object Files☆159Feb 22, 2026Updated last week
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- ☆20Sep 6, 2025Updated 5 months ago
- Unhook Ntdll.dll, Go & C++.☆33Apr 21, 2025Updated 10 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Dec 4, 2025Updated 3 months ago
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- DirSync is a simple proof of concept PowerShell module to demonstrate the impact of delegating DS-Replication-Get-Changes and DS-Replicat…☆29Apr 26, 2023Updated 2 years ago
- An extension for Burp's Web Vulnerability Scanner that can detect API discovery metadata and extract data useful during recon.☆19Sep 13, 2025Updated 5 months ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆53Sep 22, 2025Updated 5 months ago
- ☆38Jan 7, 2025Updated last year
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆32Oct 3, 2025Updated 5 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- A Patchless AMSI Bypass Technique using VEH²☆30Jun 22, 2025Updated 8 months ago
- ☆57Aug 28, 2023Updated 2 years ago
- A Rust template for writing Beacon Object Files (BOFs)☆100Feb 11, 2026Updated 3 weeks ago
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 6 months ago
- demo unhooking functions in ntdll☆28Jul 15, 2025Updated 7 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 7 months ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 4 months ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 8 months ago
- DNS Tunneling as net.Conn☆16Dec 22, 2024Updated last year
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Jan 10, 2024Updated 2 years ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Jan 14, 2025Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆27Dec 20, 2025Updated 2 months ago
- ☆26Aug 11, 2025Updated 6 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- ☆52Jul 8, 2025Updated 7 months ago