☆45Jul 12, 2018Updated 7 years ago
Alternatives and similar repositories for Reflective_PSExec
Users that are interested in Reflective_PSExec are comparing it to the libraries listed below
Sorting:
- ☆17Jul 26, 2018Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- ☆35Nov 4, 2017Updated 8 years ago
- ☆10Jun 26, 2024Updated last year
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- ☆14Sep 22, 2019Updated 6 years ago
- Contains poc's and my research works☆31Feb 13, 2023Updated 3 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- PowerView menu for Cobalt Strike☆70Mar 22, 2018Updated 7 years ago
- https://jimshaver.net/2018/02/22/net-over-net-breaking-the-boundaries-of-the-net-framework/☆19Feb 23, 2018Updated 8 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- A pattern for client/server communication via Named Pipes via C#☆97Aug 8, 2018Updated 7 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Stand-alone VNC server compiled as a Reflective DLL☆197Apr 20, 2019Updated 6 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- .NET tool for enumeration processes and dumping memory.☆57Apr 4, 2019Updated 6 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago