Remote Desktop entirely coded in PowerShell.
☆2,233Aug 1, 2024Updated last year
Alternatives and similar repositories for PowerRemoteDesktop
Users that are interested in PowerRemoteDesktop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This module allows you to run a process (defaulting to PowerShell) as a different user by providing a known username and password. By def…☆99Feb 18, 2025Updated last year
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆691Jun 28, 2022Updated 3 years ago
- PowerRunAsSystem is a PowerShell script, also available as an installable module through the PowerShell Gallery, designed to impersonate …☆268Oct 15, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- The swiss army knife of LSASS dumping☆2,094Sep 17, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 3 years ago
- ☆538Nov 20, 2021Updated 4 years ago
- Inject .NET assemblies into an existing process☆507Jan 19, 2022Updated 4 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,503Dec 21, 2023Updated 2 years ago
- Stop Windows Defender programmatically☆991Nov 4, 2022Updated 3 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,456Dec 18, 2022Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,657Aug 28, 2025Updated 8 months ago
- PoCs and tools for investigation of Windows process execution techniques☆957Feb 2, 2026Updated 2 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Create fake certs for binaries using windows binaries and the power of bat files☆573Mar 28, 2024Updated 2 years ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,496Apr 21, 2026Updated last week
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Apr 18, 2022Updated 4 years ago
- PowerBruteLogon (Ported version of WinBruteLogon in pure PowerShell)☆124Nov 9, 2023Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,629Jul 10, 2023Updated 2 years ago
- Open-Source Shellcode & PE Packer☆2,093Feb 3, 2024Updated 2 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,639Aug 6, 2022Updated 3 years ago
- Project Ares is a Proof of Concept (PoC) loader written in C/C++ based on the Transacted Hollowing technique☆337Jan 16, 2022Updated 4 years ago
- C# Reflective loader for unmanaged binaries.☆448Jan 25, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆1,682Apr 14, 2025Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆721Aug 17, 2021Updated 4 years ago
- ☆94May 14, 2022Updated 3 years ago
- Template-Driven AV/EDR Evasion Framework☆1,794Nov 3, 2023Updated 2 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,821Mar 17, 2021Updated 5 years ago
- c++ fully undetected shellcode launcher ;)☆977Jun 11, 2021Updated 4 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,412Nov 22, 2023Updated 2 years ago
- ☆489Nov 20, 2022Updated 3 years ago
- A shellcode function to encrypt a running process image when sleeping.☆338Sep 11, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Convert shellcode into different formats!☆357Jan 24, 2023Updated 3 years ago
- Framework for Kerberos relaying☆946May 29, 2022Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆462Mar 25, 2024Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,166Mar 31, 2021Updated 5 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆552Dec 3, 2023Updated 2 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago
- ☆344Sep 13, 2021Updated 4 years ago