cwolff411 / powerob
An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.
☆139Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for powerob
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆143Updated 4 years ago
- ☆161Updated last year
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆142Updated 4 years ago
- Run Rubeus via Rundll32☆198Updated 4 years ago
- Collection of cyphers for bloodhound☆143Updated 4 months ago
- ☆89Updated 2 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆189Updated 3 years ago
- Remotely enables Restricted Admin Mode☆205Updated 3 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆147Updated 5 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆223Updated 4 years ago
- ☆8Updated 3 years ago
- Koppeling x Metatwin x LazySign☆203Updated 3 years ago
- ☆69Updated 3 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆120Updated 3 years ago
- ☆131Updated 3 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆210Updated 3 years ago
- ☆123Updated 3 years ago
- ☆66Updated 4 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆316Updated 5 years ago
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆165Updated 4 years ago
- Inject remote template link into word document for remote template injection☆163Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆155Updated 3 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …