BC-SECURITY / ScriptBlock-Smuggling
Example code samples from our ScriptBlock Smuggling Blog post
☆90Updated 10 months ago
Alternatives and similar repositories for ScriptBlock-Smuggling:
Users that are interested in ScriptBlock-Smuggling are comparing it to the libraries listed below
- Lateral Movement☆123Updated last year
- Adversary Emulation Framework☆98Updated 9 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆88Updated last week
- ☆106Updated 2 months ago
- Living Off the Foreign Land setup scripts☆67Updated 2 months ago
- Lateral Movement via the .NET Profiler☆81Updated 5 months ago
- ☆54Updated 2 months ago
- A Python POC for CRED1 over SOCKS5☆148Updated 7 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated last month
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆82Updated 8 months ago
- ☆110Updated 5 months ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆121Updated 7 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆80Updated 7 months ago
- ☆55Updated 6 months ago
- BloodHound PowerShell client☆52Updated 3 weeks ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated last month
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆114Updated last year
- Microsoft Graph API post-exploitation toolkit☆94Updated 9 months ago
- ☆80Updated 9 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆143Updated 2 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆48Updated 2 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated 10 months ago
- ☆87Updated 11 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 11 months ago
- Source code and examples for PassiveAggression☆55Updated 10 months ago
- Simple BOF to read the protection level of a process☆114Updated last year
- Deploy a phishing infrastructure on the fly.☆68Updated 4 months ago