EmpireProject / PSInjectLinks
Inject PowerShell into any process
☆233Updated 6 years ago
Alternatives and similar repositories for PSInject
Users that are interested in PSInject are comparing it to the libraries listed below
Sorting:
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆390Updated 7 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆227Updated 7 years ago
- Executes PowerShell from an unmanaged process☆491Updated 9 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆320Updated 8 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆840Updated 7 years ago
- Assorted scripts and one off things☆270Updated 10 months ago
- Some PowerShell Stuff☆281Updated 3 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆318Updated 7 years ago
- Malicious WMI Events using PowerShell☆387Updated 8 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆524Updated 2 years ago
- A client compatible with Metasploit's staging protocol☆257Updated 7 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆252Updated 6 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆349Updated 7 months ago
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆380Updated 5 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆443Updated last year
- ☆257Updated 2 years ago
- Aggressor scripts I've made for Cobalt Strike☆408Updated last year
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆370Updated last year
- random powershell goodness☆449Updated 7 months ago
- Windows RID Hijacking persistence technique☆174Updated 7 months ago
- Active Directory forensic framework☆326Updated 3 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆296Updated 7 years ago
- ☆523Updated 2 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆244Updated 8 years ago
- Rapid Attack Infrastructure (RAI)☆305Updated 7 months ago
- Obfuscated Penetration Testing PowerShell scripts☆147Updated 7 months ago
- Remote Recon and Collection☆454Updated 7 years ago
- ☆283Updated 7 years ago
- ☆254Updated 6 years ago
- HTTP/S Beaconing Implant☆307Updated 7 years ago