INotGreen / Nopowershell
Call the CLR interface from memory to load powershell, process-less powershell
☆12Updated last year
Alternatives and similar repositories for Nopowershell:
Users that are interested in Nopowershell are comparing it to the libraries listed below
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆31Updated 2 years ago
- ☆19Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- ☆26Updated last year
- Enable RDP and set firewall by Windows API.☆19Updated 3 years ago
- ☆40Updated last year
- Bypass EDR Create TaskServers☆36Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆43Updated 2 years ago
- ☆31Updated last year
- Use COM Component Bypass UAC,Dll Version☆33Updated 3 years ago
- ☆22Updated last year
- Invoke-Obfuscation-Bypass + PS2EXE 过主流杀软☆53Updated 3 years ago
- Re-implement cmd.exe using windows api☆48Updated 2 years ago
- geacon for apt profile☆21Updated 2 years ago
- js加载cs的shellcode,实现免杀☆9Updated 4 years ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆66Updated 2 years ago
- shellcode loader by c++,免杀,bypass,☆15Updated 2 years ago
- 重构Beacon☆15Updated 7 months ago
- command execute without 445 port☆52Updated 3 years ago
- 白 文件扫描器 非公开☆26Updated 3 years ago
- 异或shellcode和ppid欺骗免杀☆14Updated 3 years ago
- Some anti-sandbox codes, copy directly to strengthen your own ShellCode☆11Updated 2 years ago
- use aswArPot.sys to kill process☆67Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆54Updated last year
- ☆15Updated last year
- desktop screenshot☆29Updated last year
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆32Updated 2 years ago
- Load shellcode via syscall☆47Updated 3 years ago
- Offensive Code☆20Updated last year
- 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。☆33Updated 2 years ago