☆36Nov 26, 2024Updated last year
Alternatives and similar repositories for Invoke-AMSI
Users that are interested in Invoke-AMSI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various PowerShell scripts that may be useful during red team exercise☆21Apr 28, 2022Updated 4 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Active Directory share enumeration tool☆12Apr 28, 2025Updated last year
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆191Apr 26, 2025Updated last year
- reverse engineered and improved BSQLi script from Coffinxp☆15Aug 30, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated last month
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆67Dec 29, 2023Updated 2 years ago
- ☆158Apr 4, 2025Updated last year
- Various AD tools needed for penetration testing in one place.☆24Jul 13, 2023Updated 2 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- a small wiper malware programmed in c#☆65Nov 17, 2022Updated 3 years ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆29Oct 1, 2025Updated 7 months ago
- URL scanner for recon, vulnerabilities, secrets and more!☆12Sep 27, 2021Updated 4 years ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆444May 22, 2025Updated 11 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆177Dec 19, 2025Updated 4 months ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated last month
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆95Apr 23, 2025Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆388Apr 26, 2025Updated last year
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago
- ☆59Nov 13, 2024Updated last year
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Jun 16, 2023Updated 2 years ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆247Mar 9, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Powershell version of SharpGPOAbuse☆91May 21, 2021Updated 4 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- Remove Offensive and Profane Words from Wordlists☆16Jul 27, 2023Updated 2 years ago
- Pwning Sudo Rules☆29Mar 3, 2022Updated 4 years ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆498Feb 13, 2023Updated 3 years ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Mar 2, 2025Updated last year
- Private Nuclei Templates☆99Feb 24, 2025Updated last year