PowerBruteLogon (Ported version of WinBruteLogon in pure PowerShell)
☆123Nov 9, 2023Updated 2 years ago
Alternatives and similar repositories for PowerBruteLogon
Users that are interested in PowerBruteLogon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Crack any Microsoft Windows users password without any privilege (Guest account included)☆1,157Nov 9, 2023Updated 2 years ago
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆99Feb 18, 2025Updated last year
- RunAsAttached is a program to locally run a new terminal as another user without spawning a new console window.☆46Jan 27, 2022Updated 4 years ago
- WinLogon I/O (LogonUI) Plugin for PowerRemoteDesktop☆29Feb 3, 2022Updated 4 years ago
- PowerRunAsSystem is a PowerShell script, also available as an installable module through the PowerShell Gallery, designed to impersonate …☆268Oct 15, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Get fresh Syscalls from a fresh ntdll.dll copy☆234Jan 28, 2022Updated 4 years ago
- Map remote .NET assemblies to memory for further invocation.☆38Oct 22, 2021Updated 4 years ago
- ☆17Nov 9, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆372Dec 24, 2021Updated 4 years ago
- Remote Desktop entirely coded in PowerShell.☆2,227Aug 1, 2024Updated last year
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- RunAsAttached is a program to run a console as another user and keep new console attached to caller console. Support reverse shell mode (…☆74Dec 25, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 5 months ago
- Load any Beacon Object File using Powershell!☆262Dec 9, 2021Updated 4 years ago
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆314Jul 8, 2022Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆219Mar 30, 2022Updated 4 years ago
- my learning case about windows☆21Feb 4, 2022Updated 4 years ago
- Windows active user credential phishing tool☆284Mar 10, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆95Mar 8, 2023Updated 3 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- ☆669Nov 17, 2021Updated 4 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆283Jan 14, 2023Updated 3 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- Unity SDK for Aptabase: Open Source, Privacy-First and Simple Analytics for Mobile, Desktop and Web Apps☆20Feb 22, 2026Updated last month
- ☆224Oct 22, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Inject .NET assemblies into an existing process☆508Jan 19, 2022Updated 4 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆25Jul 5, 2023Updated 2 years ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆277Apr 4, 2023Updated 3 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- Process Ghosting in C#☆219Jan 24, 2022Updated 4 years ago
- A BOF to automate common persistence tasks for red teamers☆296Mar 7, 2023Updated 3 years ago