3NC0D / Powershell-Obfuscator
Powerful script for logical obfuscation of powershell scripts
☆28Updated 6 years ago
Alternatives and similar repositories for Powershell-Obfuscator:
Users that are interested in Powershell-Obfuscator are comparing it to the libraries listed below
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆40Updated 5 years ago
- Simple C implementation to perform shellcode process injection via win32 APIs☆61Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆75Updated 5 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- I used this to see if an EDR is running in Safe Mode☆36Updated 4 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 2 weeks ago
- A quick tool for hiding a new process running shellcode.☆57Updated 4 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆35Updated 5 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated last year
- Load PE via XML Attribute☆31Updated 5 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Updated 4 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Updated 5 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 5 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆58Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆24Updated 5 years ago
- gui uac bypass (netplwiz.exe)☆66Updated 5 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆65Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 4 years ago
- Reverse shell macro using Word VBA☆14Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆110Updated 5 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Updated 4 years ago
- adding a backdooruser using win32api☆80Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago