This repo contains useful scripts that AI created for me which I would have been too lazy for
☆92Updated this week
Alternatives and similar repositories for AI-Coded-scripts
Users that are interested in AI-Coded-scripts are comparing it to the libraries listed below
Sorting:
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆116Feb 17, 2026Updated last week
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 2 months ago
- Our Tips&Tricks☆128Feb 17, 2025Updated last year
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆157Nov 23, 2025Updated 3 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆63Dec 25, 2025Updated 2 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 7 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- Group Policy Objects manipulation and exploitation framework☆291Dec 7, 2025Updated 2 months ago
- ☆15May 3, 2024Updated last year
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 3 months ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆23Dec 31, 2025Updated last month
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆181May 19, 2025Updated 9 months ago
- ☆47Dec 5, 2025Updated 2 months ago
- A modern GoPhish fork with improved tracking accuracy and smarter detection.☆86Feb 16, 2026Updated last week
- ☆33Mar 19, 2025Updated 11 months ago
- MSIX Building Made Easy for Defenders☆59Aug 25, 2025Updated 6 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆130Dec 24, 2025Updated 2 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 7 months ago
- Execute shellcode via ASPNET compiler☆62Oct 2, 2025Updated 4 months ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnos…☆43Jan 15, 2026Updated last month
- Advanced Hunting Queries☆20Dec 11, 2025Updated 2 months ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆54Oct 19, 2023Updated 2 years ago
- Windows Session Hijacking via COM☆339Dec 13, 2025Updated 2 months ago
- Inject RDPThief into memory with PowerShell.☆65Jan 21, 2025Updated last year
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆30Sep 17, 2025Updated 5 months ago
- shell code example☆67Dec 12, 2025Updated 2 months ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- ☆41Dec 24, 2025Updated 2 months ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 6 months ago