Adkali / PowerJokerView external linksLinks
PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.
☆68Dec 26, 2024Updated last year
Alternatives and similar repositories for PowerJoker
Users that are interested in PowerJoker are comparing it to the libraries listed below
Sorting:
- Shellcode loader with evasion capabilities written in Nim☆14Jan 25, 2025Updated last year
- ⚙️ Map and execute EXE in memory☆13Dec 23, 2022Updated 3 years ago
- Advanced RAT written in C#, fully controllable through Control-Panel, Discord with dedicated GUI builder to make preparation easier.☆26Jul 27, 2025Updated 6 months ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 5 months ago
- ☆21Nov 6, 2024Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆43Aug 16, 2025Updated 5 months ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- Less sugar (entropy) for your binaries☆34Sep 10, 2025Updated 5 months ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆96Aug 27, 2023Updated 2 years ago
- Event Tracing for Windows EDR bypass in Rust (usermode)☆38Jun 9, 2024Updated last year
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Mar 31, 2017Updated 8 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆29Oct 2, 2025Updated 4 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Nov 6, 2024Updated last year
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆74Dec 10, 2025Updated 2 months ago
- This Remote Access Tool (RAT), built with Go, is controlled via a Discord bot. The bot connects to a target machine and allows remote con…☆10Jun 28, 2025Updated 7 months ago
- Windows C++ Implant for Exploration C2☆44Jan 26, 2026Updated 2 weeks ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Nov 22, 2025Updated 2 months ago
- FFXI Gearswap Lua for the impaired☆10Feb 2, 2026Updated last week
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆28Jul 17, 2024Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- Custom queries list for BloodHound☆31Jul 8, 2025Updated 7 months ago
- Rex Shellcode Loader for AV/EDR evasion☆35Apr 7, 2024Updated last year
- c# reverse shell poc☆26Dec 22, 2025Updated last month
- Reverse shell that can bypass windows defender detection☆169Feb 3, 2024Updated 2 years ago
- Sample Rust Hooking Engine☆36Apr 5, 2024Updated last year
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Nov 12, 2022Updated 3 years ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60May 8, 2019Updated 6 years ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆240Mar 6, 2025Updated 11 months ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆669Oct 23, 2025Updated 3 months ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Feb 23, 2024Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆41Jan 14, 2026Updated 3 weeks ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆389Jul 30, 2024Updated last year