All the Power with no Shell
☆33Dec 13, 2021Updated 4 years ago
Alternatives and similar repositories for Invoke-NoShell
Users that are interested in Invoke-NoShell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- Powershell Scripts to automatically deploy an image of a prebuilt VM (up-to-date and with pre-deployed tools and apps) to every region yo…☆20Jun 27, 2023Updated 2 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- ☆12Jan 17, 2023Updated 3 years ago
- V1.0☆14Aug 8, 2016Updated 9 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Aug 13, 2018Updated 7 years ago
- eternalrelayx☆36Jul 10, 2019Updated 6 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Side Channel script☆25Mar 1, 2023Updated 3 years ago
- Screen recorder for x64dbg, for recording screen while debugging.☆11Jul 27, 2016Updated 9 years ago
- PoC for CVE-2020-1015☆39May 16, 2020Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- ☆281Dec 30, 2020Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- Web Scraping and Data Analysis with Selenium and Python☆14Jun 23, 2016Updated 9 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆251Sep 25, 2018Updated 7 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- ☆13Jan 27, 2024Updated 2 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆82Jun 5, 2018Updated 7 years ago
- WD My Cloud PoC exploit☆42May 22, 2019Updated 6 years ago
- a crawler for the BitcoinTalk online forum☆11Jan 23, 2023Updated 3 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- Utility to scrape pastebin's incoming feed for known malware techniques☆20Feb 4, 2020Updated 6 years ago
- Powershell SAP assessment tool☆199Aug 13, 2018Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Nov 11, 2016Updated 9 years ago
- Reflective Polymorphism☆109Jun 29, 2018Updated 7 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- scrapes Linkedin for company employee profiles☆57Mar 8, 2017Updated 9 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 8 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys fil…☆18Aug 28, 2019Updated 6 years ago