AMSI Bypass for powershell
☆30Apr 26, 2022Updated 3 years ago
Alternatives and similar repositories for AMS-BP
Users that are interested in AMS-BP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- Tools that trigger False Positive AV alerts☆56Dec 24, 2024Updated last year
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last week
- ☆12Apr 17, 2022Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆32Aug 23, 2023Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- Obfuscator for batch script☆63Aug 23, 2024Updated last year
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- ☆17Jul 1, 2022Updated 3 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆67Jun 14, 2020Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 5 years ago
- USB rubber ducky 2.O, A simple programmes which stole victim sensitive data by USB in one click & bypass firewall & defender.☆11Apr 21, 2021Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆57Feb 9, 2024Updated 2 years ago
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Injects shellcode into remote processes using direct syscalls☆77Dec 30, 2020Updated 5 years ago
- Simple reverse shell to avoid Win 11 defender detection☆122Dec 21, 2021Updated 4 years ago
- Powershell Script to Configure Active Directory Lab. It does not Create the Machine itself. You have to run this script on the machine th…☆15Aug 14, 2021Updated 4 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 8 months ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- Application for administer multidomain Active Directory-based networks☆29Dec 4, 2025Updated 3 months ago
- load dumped csharp binaries as assemblies and launch them in memory☆28Feb 9, 2024Updated 2 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆53Sep 19, 2023Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Aug 27, 2022Updated 3 years ago