cobbr / PSAmsi
PSAmsi is a tool for auditing and defeating AMSI signatures.
☆389Updated 6 years ago
Alternatives and similar repositories for PSAmsi:
Users that are interested in PSAmsi are comparing it to the libraries listed below
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆375Updated 5 years ago
- Inject PowerShell into any process☆224Updated 5 years ago
- Malicious WMI Events using PowerShell☆376Updated 8 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆253Updated 6 years ago
- Assorted scripts and one off things☆262Updated 5 months ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆320Updated 7 years ago
- Executes PowerShell from an unmanaged process☆476Updated 8 years ago
- Detect and abuse risky SPNs☆260Updated 7 years ago
- ☆515Updated 2 years ago
- ☆256Updated 2 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆322Updated 5 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆824Updated 6 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆228Updated 7 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆246Updated 4 years ago
- ☆306Updated 6 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆316Updated 7 years ago
- Aggressor scripts I've made for Cobalt Strike☆403Updated last year
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆368Updated 11 months ago
- ☆229Updated 6 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆520Updated last year
- ☆272Updated 2 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆284Updated 6 years ago
- Not PowerShell☆445Updated 8 years ago
- MSBuildShell, a Powershell Host running within MSBuild.exe☆284Updated 5 years ago
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆436Updated 2 years ago
- Lateral Movement technique using DCOM and HTA☆230Updated 2 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆510Updated 2 years ago
- AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.☆384Updated 5 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆246Updated 4 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆198Updated 6 years ago