PowerShell Constrained Language Mode Bypass
☆295Jan 31, 2021Updated 5 years ago
Alternatives and similar repositories for bypass-clm
Users that are interested in bypass-clm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bypass for PowerShell Constrained Language Mode☆406Dec 23, 2021Updated 4 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,427Jul 27, 2025Updated 8 months ago
- ☆1,677Apr 14, 2025Updated last year
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,619Jul 10, 2023Updated 2 years ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆438Jan 8, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PoC tool to coerce Windows hosts authenticate to other machines via the MS-RPRN RPC interface. This is possible via other protocols as w…☆1,112May 29, 2024Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆627Aug 15, 2025Updated 8 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆992Dec 4, 2022Updated 3 years ago
- Whisker is a C# tool for taking over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, …☆938Nov 11, 2024Updated last year
- .NET implementation of Cobalt Strike's External C2 Spec☆88Nov 12, 2021Updated 4 years ago
- The Hunt for Malicious Strings☆1,374May 13, 2025Updated 11 months ago
- Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration feature…☆304Apr 25, 2023Updated 2 years ago
- Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure …☆2,850Updated this week
- Kerberos relaying and unconstrained delegation abuse toolkit☆1,568Mar 11, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Loads any C# binary in mem, patching AMSI + ETW.☆844Oct 3, 2021Updated 4 years ago
- Payload Generation Framework☆1,973Aug 21, 2024Updated last year
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆848Dec 2, 2023Updated 2 years ago
- Powershell tool to automate Active Directory enumeration.☆1,293Apr 1, 2026Updated 2 weeks ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,321Dec 15, 2020Updated 5 years ago
- ☆419Apr 28, 2021Updated 4 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆541Sep 18, 2022Updated 3 years ago
- A tool to create a JScript file which loads a .NET v2 assembly from memory.☆1,319Jan 18, 2021Updated 5 years ago
- Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).☆822Dec 14, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PowerShell MachineAccountQuota and DNS exploit tools☆1,455Jan 11, 2023Updated 3 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆799Apr 2, 2026Updated 2 weeks ago
- Tool to audit and attack LAPS environments☆939Jan 31, 2018Updated 8 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,638Aug 6, 2022Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,166Jan 9, 2021Updated 5 years ago
- ☆762Feb 3, 2026Updated 2 months ago
- A tool to help query AD via the LDAP protocol☆619Sep 25, 2024Updated last year
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆676May 3, 2020Updated 5 years ago
- ☆1,803Aug 30, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆170Jan 25, 2024Updated 2 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆1,101Jul 26, 2021Updated 4 years ago
- From an account member of the group Backup Operators to Domain Admin without RDP or WinRM on the Domain Controller☆442Jan 4, 2025Updated last year
- Bypass AMSI by patching AmsiScanBuffer☆283Jun 4, 2021Updated 4 years ago
- DAFT: Database Audit Framework & Toolkit☆182Aug 11, 2021Updated 4 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆847Oct 29, 2025Updated 5 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,479Mar 17, 2026Updated last month