FuzzySecurity / PSKernel-Primitives
Exploit primitives for PowerShell
☆429Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for PSKernel-Primitives
- UAC 0day, all day!☆276Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆321Updated 6 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆448Updated 8 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆319Updated 7 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 8 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆303Updated 5 years ago
- A PoC WMI backdoor presented at Black Hat 2015☆270Updated 9 years ago
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆386Updated 6 years ago
- random powershell goodness☆441Updated this week
- ☆140Updated 7 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆173Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆312Updated 6 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆368Updated 9 months ago
- Powershell C2 Server and Implants☆573Updated 5 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆203Updated 2 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆516Updated last year
- Inject PowerShell into any process☆222Updated 5 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆150Updated 3 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆302Updated 8 years ago
- PowerShell Empire Web Interface☆328Updated last year
- Token Privilege Research☆782Updated 7 years ago
- An attempt at Process Doppelgänging☆183Updated 6 years ago
- Win32k LPE vulnerability used in APT attack☆286Updated 6 years ago
- Netview enumerates systems using WinAPI calls☆289Updated 2 years ago
- MSBuildShell, a Powershell Host running within MSBuild.exe☆282Updated 5 years ago