All the Power with no Shell
☆33Dec 13, 2021Updated 4 years ago
Alternatives and similar repositories for Invoke-NoShell
Users that are interested in Invoke-NoShell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- Powershell Scripts to automatically deploy an image of a prebuilt VM (up-to-date and with pre-deployed tools and apps) to every region yo…☆20Jun 27, 2023Updated 2 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- ☆12Jan 17, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- V1.0☆14Aug 8, 2016Updated 9 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Aug 13, 2018Updated 7 years ago
- eternalrelayx☆36Jul 10, 2019Updated 6 years ago
- Automated, Collection, and Enrichment Platform☆326Nov 14, 2019Updated 6 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Side Channel script☆25Mar 1, 2023Updated 3 years ago
- Screen recorder for x64dbg, for recording screen while debugging.☆11Jul 27, 2016Updated 9 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PoC for CVE-2020-1015☆40May 16, 2020Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- ☆281Dec 30, 2020Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- Web Scraping and Data Analysis with Selenium and Python☆14Jun 23, 2016Updated 9 years ago
- Active Directory ACL exploitation with BloodHound