danielbohannon / Revoke-Obfuscation
PowerShell Obfuscation Detection Framework
☆725Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for Revoke-Obfuscation
- PowerShell Remote Download Cradle Generator & Obfuscator☆823Updated 6 years ago
- PowerShell script for deobfuscating encoded PowerShell scripts☆417Updated 3 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆802Updated 4 months ago
- Executes PowerShell from an unmanaged process☆474Updated 8 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆645Updated 5 years ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆899Updated 10 months ago
- ☆732Updated last year
- ☆416Updated last year
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆628Updated 7 years ago
- A script for advanced discovery of Privileged Accounts - includes Shadow Admins☆786Updated 5 years ago
- Inject PowerShell into any process☆221Updated 5 years ago
- The Old BloodHound C# Ingestor (Deprecated)☆509Updated 2 years ago
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆386Updated 6 years ago
- Cmd.exe Command Obfuscation Generator & Detection Test Harness☆827Updated 6 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆462Updated 3 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆367Updated 5 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆479Updated 7 years ago
- Random Tools☆828Updated 2 years ago
- Various PowerShell scripts that may be useful during red team exercise☆930Updated 2 years ago
- PowerShell Pass The Hash Utils☆1,472Updated 5 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,771Updated 3 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,386Updated 6 years ago
- Tool Analysis Result Sheet☆345Updated 6 years ago
- PowerShell Scripts I find useful☆735Updated 8 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆858Updated 3 years ago
- Active Directory Control Paths auditing and graphing tools☆651Updated 3 years ago
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆435Updated this week
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆774Updated last year
- PowerShell Module with Security cmdlets for security work☆435Updated 4 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,521Updated 5 years ago