GetRektBoy724 / ReversePowernoid
Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)
☆30Updated 3 years ago
Alternatives and similar repositories for ReversePowernoid:
Users that are interested in ReversePowernoid are comparing it to the libraries listed below
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- AMSI Bypass for powershell☆30Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆29Updated 3 years ago
- Citrix Phishlet☆22Updated 4 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆13Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 9 months ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- ☆26Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- Modified version of PEAS client for offensive operations☆39Updated 2 years ago
- ☆17Updated 4 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆24Updated last year
- (kinda) Malicious Outlook Reader☆18Updated 4 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- ☆16Updated 5 months ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆19Updated last year
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆23Updated last year
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆35Updated 3 years ago
- ☆13Updated 5 years ago