☆36Nov 26, 2024Updated last year
Alternatives and similar repositories for Invoke-AMSI
Users that are interested in Invoke-AMSI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various PowerShell scripts that may be useful during red team exercise☆21Apr 28, 2022Updated 3 years ago
- ONYX: Cisco Automated Assessment and Auditing Tool (CAAAT). An open-source tool that automatically assesses and audits Cisco IOS routers …☆21May 6, 2025Updated 11 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- reverse engineered and improved BSQLi script from Coffinxp☆15Aug 30, 2024Updated last year
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated last month
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆67Dec 29, 2023Updated 2 years ago
- ☆159Apr 4, 2025Updated last year
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- a small wiper malware programmed in c#☆60Nov 17, 2022Updated 3 years ago
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- ☆29Oct 1, 2025Updated 6 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- URL scanner for recon, vulnerabilities, secrets and more!☆12Sep 27, 2021Updated 4 years ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆176Dec 19, 2025Updated 3 months ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated last month
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆94Apr 23, 2025Updated 11 months ago
- Penguin Xposed Framework☆10Apr 15, 2019Updated 6 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Jul 9, 2023Updated 2 years ago
- LSASS memory dumper using only NTAPIs, creating a minimal minidump. It can be compiled as shellcode (PIC), supports XOR encryption, and r…☆387Apr 26, 2025Updated 11 months ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Jul 10, 2021Updated 4 years ago
- Alternative implement of Taiwan NHI smart-card agent☆52May 19, 2020Updated 5 years ago
- ☆59Nov 13, 2024Updated last year
- POC FortiOS SSL-VPN buffer overflow vulnerability☆27Jun 16, 2023Updated 2 years ago
- Install linux rootfs directly in android rooted devices☆18Sep 5, 2025Updated 7 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆247Mar 9, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- BusPwn V1.0 is a powerful Modbus hacking framework designed for testing and exploiting vulnerabilities in Modbus-based systems commonly f…☆27Apr 19, 2025Updated 11 months ago
- This Repo clone and organize all nuclei templates that are found in Github. { due to git runner time limit stopped the workflow, ping me …☆12Feb 28, 2025Updated last year
- Powershell version of SharpGPOAbuse☆91May 21, 2021Updated 4 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- Remove Offensive and Profane Words from Wordlists☆16Jul 27, 2023Updated 2 years ago
- Pwning Sudo Rules☆29Mar 3, 2022Updated 4 years ago
- Collection of Notes and CheatSheets used for Red teaming Certs☆498Feb 13, 2023Updated 3 years ago