Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
☆34Dec 29, 2020Updated 5 years ago
Alternatives and similar repositories for OffenPowerSh
Users that are interested in OffenPowerSh are comparing it to the libraries listed below
Sorting:
- Python3版本Poc-T(渗透测试插件化并发框架)☆11Apr 3, 2020Updated 5 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- ☆17Oct 4, 2020Updated 5 years ago
- A Golang Reverse Shell Tool With AES Dynamic Encryption☆84Mar 16, 2020Updated 5 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆98Jul 10, 2020Updated 5 years ago
- myshellcode☆31Nov 26, 2020Updated 5 years ago
- crypto args for golang☆17Feb 14, 2022Updated 4 years ago
- This is a project to receive Base64 data and decode it in process☆15Mar 16, 2020Updated 5 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Oct 21, 2020Updated 5 years ago
- a secure and highly-portable reverse proxy (redirector) for your Red Team infrastructure.☆34Sep 4, 2019Updated 6 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Sep 27, 2020Updated 5 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Dec 9, 2020Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- Simple executable generator with encrypted shellcode.☆280Oct 3, 2022Updated 3 years ago
- AV Evasion, a Red Team Tool - Fiber, APC, PNG and UUID☆21Sep 7, 2021Updated 4 years ago
- redteam Build platform☆19Nov 13, 2023Updated 2 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- Get all possible href | src | url from target url or domain☆40Aug 5, 2020Updated 5 years ago
- 从zoomeye or shodan or file 获取目标进行攻击。☆17Nov 21, 2019Updated 6 years ago
- ☆22May 29, 2020Updated 5 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- ☆57Jan 15, 2024Updated 2 years ago
- A quick example of the Hells Gate technique in Nim☆94Aug 11, 2021Updated 4 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Jul 5, 2020Updated 5 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Jan 18, 2022Updated 4 years ago
- MiniDumpWriteDump behavior modification hook☆50Feb 15, 2021Updated 5 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Loads shellcode from a resource file.☆22Aug 15, 2019Updated 6 years ago