Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.
☆43Nov 10, 2018Updated 7 years ago
Alternatives and similar repositories for Babel-Shellfish
Users that are interested in Babel-Shellfish are comparing it to the libraries listed below
Sorting:
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Nov 15, 2016Updated 9 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Simple AutoIt crypter.☆11Mar 3, 2017Updated 8 years ago
- ☆93Nov 1, 2018Updated 7 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- XXE vulnerability demo☆22Jun 1, 2014Updated 11 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- CSHARP DCOM Fun☆138Sep 16, 2019Updated 6 years ago
- ☆15Apr 20, 2020Updated 5 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Ex-pv8's☆64Aug 28, 2019Updated 6 years ago
- A collection of Windows software baseline notes with corresponding Windows Defender Application Control (WDAC) policies☆64Dec 18, 2023Updated 2 years ago
- CVE-2019-1040 with Kerberos delegation☆33Jun 18, 2021Updated 4 years ago
- A collection of useful aggressor scripts. All credits due to its authors.☆12Jul 5, 2019Updated 6 years ago
- Network Interface Communication Emulator☆14Apr 15, 2020Updated 5 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Python implementation of RSA reverse shell.☆11Dec 31, 2016Updated 9 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Mar 27, 2020Updated 5 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆64Nov 22, 2019Updated 6 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- A C# penetration testing tool to discover low-haning web fruit via web requests.☆91May 26, 2022Updated 3 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- Documentation and supporting script sample for Windows Exploit Guard☆169Sep 8, 2025Updated 5 months ago
- python tools to assist in penetration testing☆14Jan 19, 2026Updated last month