JoelGMSec / Invoke-Transfer
PowerShell Clipboard Data Transfer
☆68Updated 5 months ago
Alternatives and similar repositories for Invoke-Transfer:
Users that are interested in Invoke-Transfer are comparing it to the libraries listed below
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 3 months ago
- ☆47Updated 2 years ago
- Duplicate not owned Token from Running Process☆72Updated last year
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆106Updated 2 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 7 months ago
- Small project to facilitate creation of .lnk payloads☆62Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆78Updated 4 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- C# havoc implant☆97Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆62Updated 3 weeks ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆133Updated 5 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆102Updated last week
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆82Updated last year
- Reasonably undetected shellcode stager and executer.☆35Updated 4 months ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆88Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆119Updated 2 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆64Updated last year
- A RunAs clone with the ability to specify the password as an argument.☆111Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆168Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆70Updated last year
- A Rust-based dropper for shellcode payloads.☆61Updated 4 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆160Updated last year
- ACL abuse swiss-knife☆117Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆101Updated 7 months ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- ☆29Updated last year