A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.
☆11Apr 21, 2025Updated 10 months ago
Alternatives and similar repositories for PS2BAT
Users that are interested in PS2BAT are comparing it to the libraries listed below
Sorting:
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆15Apr 21, 2025Updated 10 months ago
- GolangStyle, best looking go library.☆13Apr 21, 2025Updated 10 months ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 10 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Apr 21, 2025Updated 10 months ago
- Enable-All-Tokens is a Go-based project designed to adjust and enable a list of specified privileges for the current process token on a W…☆10Apr 21, 2025Updated 10 months ago
- Kill malawarebytes process. Can be ported to any programming language.☆12Apr 21, 2025Updated 10 months ago
- A malicous Golang Package☆15Apr 21, 2025Updated 10 months ago
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 10 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Apr 21, 2025Updated 10 months ago
- Examples how to use a Assm (Assembly) in a go.☆23Apr 21, 2025Updated 10 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆61Apr 27, 2025Updated 10 months ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- Simple Chatbot for testing AI Red Team tooling☆16Feb 11, 2025Updated last year
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 10 months ago
- Red Team Coin for crypto-mining operations.☆23Jan 12, 2026Updated last month
- VBS-Obfuscator-GO is a Go-based tool designed for obfuscating VBScript (VBS) files. It transforms readable VBScript code into a less reco…☆38Apr 21, 2025Updated 10 months ago
- roblox Cookie Refresher in Node.js, it can be dualhooked and you can host it on site like onrender.com, replace webhook in server.js☆16Jan 22, 2024Updated 2 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Auth system with encryption and web dashboard in python☆18May 7, 2024Updated last year
- Source code obfuscator for Golang☆34Oct 5, 2024Updated last year
- ☆11May 5, 2024Updated last year
- ☆15Apr 29, 2023Updated 2 years ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27May 13, 2025Updated 9 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆51May 22, 2025Updated 9 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 10 months ago
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- A mutliple tactics to execute shellcode in go :}☆23Apr 21, 2025Updated 10 months ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆26Apr 21, 2025Updated 10 months ago
- Overwrites MBR with own ASM file!☆82Sep 4, 2024Updated last year
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆33Feb 15, 2026Updated last week
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆83Feb 2, 2026Updated 3 weeks ago
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated last year
- Discord HTTP requests interception POC, including backup codes requests, for educational purposes only.☆25Jul 11, 2024Updated last year
- Curso de procesamiento de imágenes con Python☆12Feb 26, 2020Updated 6 years ago