ASP4RUX / Invoke-AMSILinks
☆35Updated 6 months ago
Alternatives and similar repositories for Invoke-AMSI
Users that are interested in Invoke-AMSI are comparing it to the libraries listed below
Sorting:
- ☆84Updated 3 months ago
- ☆56Updated 6 months ago
- Situational Awareness script to identify how and where to run implants☆50Updated 5 months ago
- ☆85Updated 4 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆44Updated last year
- ☆90Updated last week
- ☆70Updated last month
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Inject RDPThief into memory with PowerShell.☆64Updated 4 months ago
- Simple netexec wraper with html repport☆19Updated last year
- Encodes a payload within a generated mock-CSS file☆58Updated last year
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 6 months ago
- C++ Reflective Assembly Loader☆25Updated 2 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 2 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- A Moodle Scanner☆42Updated 6 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆54Updated 5 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆30Updated last week
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆102Updated 7 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆29Updated last month
- ☆136Updated last month
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆104Updated this week
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated 11 months ago
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- LDAP Enumeration Tool for Pentesters☆47Updated last month
- ☆55Updated 3 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year