S3cur3Th1sSh1t / Get-System-TechniquesView external linksLinks
☆98Jun 20, 2022Updated 3 years ago
Alternatives and similar repositories for Get-System-Techniques
Users that are interested in Get-System-Techniques are comparing it to the libraries listed below
Sorting:
- ☆360Apr 24, 2021Updated 4 years ago
- Load C# Code straight to memory☆56May 14, 2020Updated 5 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆130May 25, 2021Updated 4 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆838Oct 3, 2021Updated 4 years ago
- An Insider Threat Toolkit☆155Dec 17, 2018Updated 7 years ago
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆63Sep 2, 2020Updated 5 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆538Sep 18, 2022Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Aug 25, 2020Updated 5 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- ☆350Feb 21, 2022Updated 3 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆244Aug 12, 2020Updated 5 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- C# Reflective loader for unmanaged binaries.☆447Jan 25, 2023Updated 3 years ago
- Credential Dumper☆79Feb 19, 2020Updated 5 years ago
- YouTube/Livestream project for obfuscating C# source code using Roslyn☆129May 9, 2021Updated 4 years ago
- D/Invoke port of UrbanBishop☆108Jul 19, 2020Updated 5 years ago
- Collection of beacon BOF written to learn windows and cobaltstrike☆362Feb 24, 2023Updated 2 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Sep 23, 2020Updated 5 years ago
- C# Based Universal API Unhooker☆411Feb 18, 2022Updated 3 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆202Jul 14, 2021Updated 4 years ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago
- ☆93Aug 23, 2021Updated 4 years ago