BC-SECURITY / ScriptBlock-SmugglingLinks
Example code samples from our ScriptBlock Smuggling Blog post
☆92Updated last year
Alternatives and similar repositories for ScriptBlock-Smuggling
Users that are interested in ScriptBlock-Smuggling are comparing it to the libraries listed below
Sorting:
- ☆109Updated 9 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆98Updated 7 months ago
- Lateral Movement☆124Updated 2 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- ☆57Updated 9 months ago
- ☆86Updated 6 months ago
- ☆51Updated 4 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆101Updated 8 months ago
- ☆136Updated 9 months ago
- Lateral Movement via the .NET Profiler☆84Updated last year
- Situational Awareness script to identify how and where to run implants☆67Updated 11 months ago
- Small project to facilitate creation of .lnk payloads☆75Updated 3 years ago
- Sniffing files generator☆59Updated 9 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Updated 9 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 6 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆154Updated last month
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆35Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated 2 years ago
- C# havoc implant☆101Updated 2 years ago
- ☆82Updated last year
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Updated 11 months ago
- Source code and examples for PassiveAggression☆64Updated last year
- Duplicate not owned Token from Running Process☆73Updated 2 years ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- TokenCert☆101Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- POC of GITHUB simple C2 in rust☆52Updated 4 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Updated 9 months ago