JoelGMSec / PSAsyncShell
PowerShell Asynchronous TCP Reverse Shell
☆155Updated last year
Alternatives and similar repositories for PSAsyncShell:
Users that are interested in PSAsyncShell are comparing it to the libraries listed below
- Run Powershell without software restrictions.☆285Updated 3 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆264Updated 2 weeks ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆123Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated last year
- Shellcode launcher for AV bypass☆215Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆299Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆107Updated 2 years ago
- Terminate AV/EDR Processes using kernel driver☆340Updated last year
- A python script to dump files and folders remotely from a Windows SMB share.☆219Updated last month
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆279Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆457Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆393Updated 8 months ago
- C# Lsass parser☆284Updated 3 years ago
- Kill AV/EDR leveraging BYOVD attack☆342Updated last year
- COM Hijacking VOODOO☆268Updated this week
- Run Your Payload Without Running Your Payload☆180Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆201Updated 2 months ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆447Updated 11 months ago
- ☆164Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆296Updated 2 years ago
- A technique to coerce a Windows SQL Server to authenticate on an arbitrary machine.☆127Updated last year
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆363Updated 3 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆258Updated last year
- A C# implementation of RDPThief to steal credentials from RDP.☆158Updated 4 years ago
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆260Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆165Updated 4 months ago