CBHue / PyFuscationLinks
Obfuscate powershell scripts by replacing Function names, Variables and Parameters.
☆522Updated 3 years ago
Alternatives and similar repositories for PyFuscation
Users that are interested in PyFuscation are comparing it to the libraries listed below
Sorting:
- Active Directory ACL exploitation with BloodHound☆755Updated 4 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆605Updated last year
- C# Script used for Red Team☆723Updated 4 years ago
- ☆525Updated 3 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆811Updated 3 years ago
- An script to perform kerberos bruteforcing by using impacket☆455Updated 3 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆879Updated 4 years ago
- Process Injection☆764Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆1,055Updated 5 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆525Updated 3 years ago
- Exchange privilege escalations to Active Directory☆800Updated 2 years ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆585Updated 5 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆514Updated 5 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,295Updated 6 years ago
- Kerberoast attack -pure python-☆434Updated 2 years ago
- Bypass for PowerShell Constrained Language Mode☆403Updated 4 years ago
- C# Data Collector for the BloodHound Project, Version 3☆548Updated 3 years ago
- Search for potential frontable domains☆644Updated 2 years ago
- SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader☆1,303Updated 6 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆821Updated last month
- getsystem via parent process using ps1 & embeded c#☆461Updated 2 years ago
- SpoolSample -> Responder w/NetNTLM Downgrade -> NetNTLMv1 -> NTLM -> Kerberos Silver Ticket☆913Updated 4 years ago
- PowerShell rebuilt in C# for Red Teaming purposes☆1,050Updated 2 months ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆144Updated 4 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆738Updated 5 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆966Updated 8 years ago
- NTLMv1 Multitool☆655Updated last month
- Standalone binaries for Linux/Windows of Impacket's examples☆745Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Updated 5 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆512Updated 6 years ago