davehardy20 / PoSHBypassView external linksLinks
☆25Jul 5, 2018Updated 7 years ago
Alternatives and similar repositories for PoSHBypass
Users that are interested in PoSHBypass are comparing it to the libraries listed below
Sorting:
- ☆11Mar 19, 2019Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆130May 25, 2021Updated 4 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Load C# Code straight to memory☆56May 14, 2020Updated 5 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- MSBuildShell, a Powershell Host running within MSBuild.exe☆294Aug 2, 2019Updated 6 years ago
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 5 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Dec 1, 2022Updated 3 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- ☆230May 10, 2018Updated 7 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- Windows Stagers to circumvent restrictive network environments☆68Sep 23, 2024Updated last year
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 6 years ago
- ☆10Jun 26, 2024Updated last year
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- A pattern for a self-installing Windows service in C# with the unstoppable attributes in C#.☆67Jan 19, 2019Updated 7 years ago
- PowerView menu for Cobalt Strike☆70Mar 22, 2018Updated 7 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆207May 11, 2023Updated 2 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Jul 9, 2019Updated 6 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Presentation material presented by Outflank team members at public events.☆192Oct 1, 2025Updated 4 months ago