aloksaurabh / OffenPowerSh
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
☆34Updated 4 years ago
Alternatives and similar repositories for OffenPowerSh:
Users that are interested in OffenPowerSh are comparing it to the libraries listed below
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 4 years ago
- PoC para las vulnerabilidades CVE-2020-14750 y cve-2020-14882☆46Updated 4 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆45Updated 3 years ago
- juicypotato for win10 > 1803 & win server 2019☆96Updated 3 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆93Updated 4 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated last year
- ☆38Updated 7 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 3 years ago
- A sort of simple shell which support multiple protocols.☆99Updated 5 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆108Updated 5 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆20Updated 4 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 4 years ago
- My CobaltStrike BOFS☆160Updated 2 years ago
- Aggressor Scripts for Cobalt Strike☆77Updated 10 months ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆57Updated 7 years ago
- XOR Payload Encryptor for .NET and Payload Runner with Built-in XOR Decryptor☆43Updated 5 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆109Updated 4 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆35Updated 4 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Updated 4 years ago
- ☆60Updated 3 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- Security Support Provider Interface☆46Updated 4 years ago
- PoC to interact with local/remote registry hives through WMI☆83Updated 4 years ago
- Yet another LSASS dumper☆76Updated 4 years ago
- A standalone WMI protocol for CrackMapExec☆50Updated 4 years ago