PowerShell Clipboard Data Transfer
☆73Dec 29, 2025Updated 3 months ago
Alternatives and similar repositories for Invoke-Transfer
Users that are interested in Invoke-Transfer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆48Apr 15, 2022Updated 3 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 3 years ago
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆286Aug 5, 2022Updated 3 years ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 4 months ago
- Dump NTDS with golden certificates and UnPAC the hash☆646Mar 20, 2024Updated 2 years ago
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆190Jan 30, 2023Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆219Mar 30, 2022Updated 4 years ago
- Weaponized HellsGate/SigFlip☆207Jun 7, 2023Updated 2 years ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆506Dec 19, 2023Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Feb 20, 2022Updated 4 years ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆411Jun 19, 2023Updated 2 years ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆474Jul 6, 2024Updated last year
- Dynamically generated obfuscated jumps and/or function calls☆38Apr 19, 2023Updated 2 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Feb 13, 2024Updated 2 years ago
- Multiplatform Telegram Bot in pure PowerShell☆56Dec 1, 2022Updated 3 years ago
- Find Email Spoofing Vulnerablity of domains☆96Jul 30, 2024Updated last year
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆207Aug 12, 2024Updated last year
- ☆46Jun 25, 2024Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆335Jul 20, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆45Jan 10, 2024Updated 2 years ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated last year
- PE obfuscator with Evasion in mind☆213Apr 25, 2023Updated 2 years ago
- ☆39Feb 26, 2025Updated last year
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆459Mar 25, 2024Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Aug 31, 2023Updated 2 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆306Aug 2, 2023Updated 2 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Execute unmanaged Windows executables in CobaltStrike Beacons☆717Mar 4, 2023Updated 3 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆282Feb 24, 2025Updated last year
- ☆128Jun 28, 2023Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆352Oct 22, 2024Updated last year
- Asynchronous RDP/VNC client for Python (GUI)☆79Jan 1, 2025Updated last year
- Winsocket for Cobalt Strike.☆105Jul 6, 2023Updated 2 years ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆186Aug 2, 2023Updated 2 years ago