aloksaurabh / OffenPowerShLinks
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
☆34Updated 4 years ago
Alternatives and similar repositories for OffenPowerSh
Users that are interested in OffenPowerSh are comparing it to the libraries listed below
Sorting:
- A simple C implementation to decoded your shellcode and writes it directly to memory☆95Updated 5 years ago
- ☆37Updated 7 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 5 years ago
- XOR Payload Encryptor for .NET and Payload Runner with Built-in XOR Decryptor☆45Updated 6 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- PoC para las vulnerabilidades CVE-2020-14750 y cve-2020-14882☆48Updated 4 years ago
- Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.☆39Updated 4 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆117Updated 5 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- Yet another LSASS dumper☆76Updated 4 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆141Updated 4 years ago
- Security Support Provider Interface☆47Updated 5 years ago
- Privilege Escalation Via RpcSs svc☆180Updated 3 years ago
- Various Aggressor Scripts I've Created.☆150Updated 3 years ago
- Basic password spraying tool for internal tests and red teaming☆91Updated 5 years ago
- My CobaltStrike BOFS☆165Updated 3 years ago
- A sort of simple shell which support multiple protocols.☆100Updated 5 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆59Updated 8 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆67Updated 3 weeks ago
- JScript RAT☆101Updated 4 years ago
- a patched sshd for red team activities☆82Updated 4 years ago
- ☆160Updated 3 years ago
- CVE-2021-21972☆33Updated 4 years ago
- A standalone WMI protocol for CrackMapExec☆51Updated 5 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated 2 years ago
- PoC exploits for CVE-2020-17382☆115Updated 4 years ago
- Steal privileged token to obtain SYSTEM shell☆250Updated 5 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 5 years ago