BC-SECURITY / ScriptBlock-SmugglingLinks
Example code samples from our ScriptBlock Smuggling Blog post
☆94Updated last year
Alternatives and similar repositories for ScriptBlock-Smuggling
Users that are interested in ScriptBlock-Smuggling are comparing it to the libraries listed below
Sorting:
- ☆108Updated 10 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆101Updated 8 months ago
- Lateral Movement☆126Updated 2 years ago
- ☆86Updated 7 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Lateral Movement via the .NET Profiler☆84Updated last year
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- ☆57Updated 10 months ago
- Permanently disable EDRs as local admin☆124Updated 3 weeks ago
- Sniffing files generator☆59Updated 10 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- Source code and examples for PassiveAggression☆64Updated last year
- ☆137Updated 11 months ago
- ☆50Updated 6 months ago
- ☆120Updated 9 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆101Updated 2 years ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- Small project to facilitate creation of .lnk payloads☆75Updated 3 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- ☆83Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Updated 11 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- Duplicate not owned Token from Running Process☆74Updated 2 years ago