The best powershell obfuscator ever made
☆126Aug 1, 2025Updated 7 months ago
Alternatives and similar repositories for PowerCrypt
Users that are interested in PowerCrypt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jan 9, 2025Updated last year
- ☆21Jan 8, 2026Updated 2 months ago
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 9 months ago
- The first open source runtime windows batch and command line deobfuscator☆43Aug 20, 2025Updated 7 months ago
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- ☆16Dec 7, 2025Updated 3 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆57Dec 4, 2025Updated 3 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated last month
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆62Aug 18, 2025Updated 7 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 11 months ago
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- ☆38Apr 15, 2025Updated 11 months ago
- Kill malawarebytes process. Can be ported to any programming language.☆12Apr 21, 2025Updated 11 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆77Jun 16, 2025Updated 9 months ago
- Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088☆55Aug 18, 2025Updated 7 months ago
- Most advanced and poorly coded windows batch obfuscator ever made (aka the best)☆349Dec 1, 2025Updated 3 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆216Oct 19, 2024Updated last year
- Ghosting-AMSI☆226Apr 24, 2025Updated 10 months ago
- Execute shellcode via Bluetooth device authentication☆41Feb 19, 2025Updated last year
- A PowerShell console in C/C++ with all the security features disabled☆373Oct 14, 2025Updated 5 months ago
- ☆19Dec 18, 2024Updated last year
- ☆28Oct 19, 2024Updated last year
- Advanced In-Memory PowerShell Process Injection Framework☆73Jul 16, 2025Updated 8 months ago
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- ☆41Oct 8, 2024Updated last year
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆28May 13, 2025Updated 10 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- Generate and Manage KeyCredentialLinks☆253Mar 9, 2026Updated 2 weeks ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆167Nov 2, 2025Updated 4 months ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆374Apr 19, 2023Updated 2 years ago
- ☆82Apr 28, 2025Updated 10 months ago
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆42Jan 6, 2026Updated 2 months ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆52May 8, 2024Updated last year
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated 11 months ago