PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.
☆69Dec 26, 2024Updated last year
Alternatives and similar repositories for PowerJoker
Users that are interested in PowerJoker are comparing it to the libraries listed below
Sorting:
- ☆36Feb 12, 2026Updated 3 weeks ago
- Shellcode loader with evasion capabilities written in Nim☆15Jan 25, 2025Updated last year
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 6 months ago
- Advanced RAT written in C#, fully controllable through Control-Panel, Discord with dedicated GUI builder to make preparation easier.☆25Jul 27, 2025Updated 7 months ago
- ☆21Nov 6, 2024Updated last year
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- Less sugar (entropy) for your binaries☆33Sep 10, 2025Updated 5 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆46Aug 16, 2025Updated 6 months ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆97Aug 27, 2023Updated 2 years ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Mar 31, 2017Updated 8 years ago
- Event Tracing for Windows EDR bypass in Rust (usermode)☆39Jun 9, 2024Updated last year
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- C# havoc implant☆101Feb 12, 2023Updated 3 years ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆30Oct 2, 2025Updated 5 months ago
- Wingkalabs (Linux) Wingkalabs es una máquina Virtual Linux intencionalmente vulnerable. Esta máquina virtual se puede utilizar para real…☆22Mar 14, 2018Updated 7 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Nov 22, 2025Updated 3 months ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆75Dec 10, 2025Updated 2 months ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆30Jul 17, 2024Updated last year
- This Remote Access Tool (RAT), built with Go, is controlled via a Discord bot. The bot connects to a target machine and allows remote con…☆10Jun 28, 2025Updated 8 months ago
- Windows C++ Implant for Exploration C2☆44Jan 26, 2026Updated last month
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Jun 25, 2024Updated last year
- Rex Shellcode Loader for AV/EDR evasion☆35Apr 7, 2024Updated last year
- Custom queries list for BloodHound☆31Jul 8, 2025Updated 7 months ago
- c# reverse shell poc☆26Dec 22, 2025Updated 2 months ago
- A red teaming attack paradigm against AI Agents☆32Mar 9, 2025Updated 11 months ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆672Oct 23, 2025Updated 4 months ago
- Collection of useful pre-compiled .NET binaries or other executables for penetration testing Windows Active Directory environments☆245Feb 16, 2026Updated 2 weeks ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆42Jan 14, 2026Updated last month
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆389Jul 30, 2024Updated last year
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆148May 6, 2023Updated 2 years ago
- Shellcode obfuscation tool to avoid AV/EDR.☆130Sep 1, 2023Updated 2 years ago