Cn33liz / p0wnedReverseView external linksLinks
PowerShell Runspace Connect-Back Shell
☆26Dec 31, 2015Updated 10 years ago
Alternatives and similar repositories for p0wnedReverse
Users that are interested in p0wnedReverse are comparing it to the libraries listed below
Sorting:
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆46Jun 10, 2016Updated 9 years ago
- Simple C# reverse shell with shellcode and process injection☆39May 13, 2016Updated 9 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- VBS Reversed TCP Meterpreter Stager☆88May 25, 2017Updated 8 years ago
- ☆65May 26, 2016Updated 9 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- ☆78May 24, 2018Updated 7 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- ☆12Aug 29, 2025Updated 5 months ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- A walkthrough of deploying and configuring a PowerShell Private Gallery to Azure via ARM Templates, DSC Configurations, and Visual Studio…☆12Mar 8, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆131Sep 26, 2016Updated 9 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated 2 weeks ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆17Jan 13, 2024Updated 2 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆14Mar 31, 2016Updated 9 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Apr 30, 2019Updated 6 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 10 months ago
- ☆121Oct 6, 2015Updated 10 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆19Mar 15, 2017Updated 8 years ago
- ☆22Mar 5, 2018Updated 7 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 12 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 9 years ago
- Group Policy Hijacking☆32Apr 6, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Loki PWS - Control Panel New Version leaked☆22Aug 9, 2018Updated 7 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Generate RSA keys, encrypt and decrypt data☆24Apr 8, 2021Updated 4 years ago
- PowerShell module to interact with Windows Presentation Foundation (or WPF) controls.☆30Apr 10, 2024Updated last year
- My Shellcode Archive☆29Mar 21, 2017Updated 8 years ago