Unit-259 / PsInPicLinks
A powershell module for hiding payloads in the pixels of images
☆61Updated 11 months ago
Alternatives and similar repositories for PsInPic
Users that are interested in PsInPic are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆147Updated 4 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆149Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 5 months ago
- Continuous password spraying tool☆189Updated 3 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated 9 months ago
- A collection of Cobalt Strike Aggressor scripts.☆98Updated 3 years ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆147Updated 2 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆191Updated last month
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated last month
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆62Updated last week
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 3 months ago
- ☆71Updated last month
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- ☆178Updated last week
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆128Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆193Updated 2 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆201Updated last year
- ☆59Updated 8 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆34Updated last year
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆37Updated 5 months ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆157Updated 5 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆175Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 8 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆102Updated 7 months ago
- ☆177Updated 10 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆78Updated 2 years ago