Unit-259 / PsInPicLinks
A powershell module for hiding payloads in the pixels of images
☆60Updated 11 months ago
Alternatives and similar repositories for PsInPic
Users that are interested in PsInPic are comparing it to the libraries listed below
Sorting:
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 7 months ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Continuous password spraying tool☆186Updated 3 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆170Updated 2 weeks ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆148Updated 11 months ago
- ☆103Updated 8 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆100Updated last year
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 4 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆151Updated 2 months ago
- ☆70Updated last month
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- ☆97Updated last week
- ☆164Updated 10 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆37Updated 4 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 11 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆152Updated last year
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆153Updated last month
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆191Updated 3 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆190Updated 3 weeks ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 2 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆102Updated 7 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆200Updated 11 months ago
- Azure Post Exploitation Framework☆199Updated 3 months ago
- ☆176Updated last week
- Python utility that generates "imageless" QR codes in various formats☆119Updated 9 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆144Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆91Updated last month