aloksaurabh / OffenPowerShLinks
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
☆34Updated 4 years ago
Alternatives and similar repositories for OffenPowerSh
Users that are interested in OffenPowerSh are comparing it to the libraries listed below
Sorting:
- A simple C implementation to decoded your shellcode and writes it directly to memory☆95Updated 5 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆38Updated 5 years ago
- XOR Payload Encryptor for .NET and Payload Runner with Built-in XOR Decryptor☆45Updated 6 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- a patched sshd for red team activities☆82Updated 4 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆141Updated 4 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- PoC para las vulnerabilidades CVE-2020-14750 y cve-2020-14882☆48Updated 4 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆118Updated 5 years ago
- Yet another LSASS dumper☆74Updated 4 years ago
- ☆37Updated 7 years ago
- My CobaltStrike BOFS☆164Updated 3 years ago
- A sort of simple shell which support multiple protocols.☆100Updated 6 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆67Updated 2 months ago
- Security Support Provider Interface☆47Updated 5 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46Updated 4 years ago
- Basic password spraying tool for internal tests and red teaming☆91Updated 5 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.☆39Updated 4 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 5 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- PoC exploits for CVE-2020-17382☆115Updated 5 years ago
- CVE-2021-21972☆33Updated 4 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 5 years ago
- Privilege Escalation Via RpcSs svc☆181Updated 3 years ago
- Various Aggressor Scripts I've Created.☆151Updated 3 years ago
- JScript RAT☆101Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆38Updated 3 years ago
- A collection of Cobalt Strike aggressor scripts☆18Updated 5 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆34Updated 5 years ago