3xploit666 / Shell-Custom
this is a simple shell that has the ability to bypass defenses
☆13Updated 8 months ago
Alternatives and similar repositories for Shell-Custom:
Users that are interested in Shell-Custom are comparing it to the libraries listed below
- Extra cmdlets to help with quering security related information from Azure☆13Updated 4 months ago
- ☆12Updated 2 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆42Updated 7 months ago
- ☆21Updated 2 years ago
- ☆19Updated last year
- User enumeration and password spraying tool for testing Azure AD☆69Updated 2 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- This repo will contain some basic pentest/RT commands.☆37Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Weaponising C# - Fundamentals Training Content☆70Updated 3 years ago
- ☆47Updated 2 years ago
- ☆28Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Most Responder's configuration power in your hand.☆42Updated last week
- ☆25Updated last year
- ☆12Updated 2 months ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- Deploy a phishing infrastructure on the fly.☆66Updated last month
- Federated Office365 user enumeration based on correlated response trend analysis☆48Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆39Updated last year
- ☆37Updated 9 months ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated last month
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- Get Fine Grained Password Policy☆67Updated 8 months ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆100Updated 2 years ago
- Windows Post-Exploitation tools wrapper☆12Updated 7 months ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆17Updated 2 years ago