dumpsterfirevip / Cloakify-Powershell
Cloak files using text based steganography output to obsfucate what data they contain. Coded in Powershell. This is a port of TryCatchHCF's Cloakify written in python
☆42Updated 3 years ago
Alternatives and similar repositories for Cloakify-Powershell:
Users that are interested in Cloakify-Powershell are comparing it to the libraries listed below
- ☆39Updated 6 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆58Updated 5 years ago
- ☆24Updated 6 years ago
- PowerShell module to play with Kerberos S4U extensions☆51Updated 7 years ago
- ☆52Updated 5 years ago
- Set of ultra technical notes about AD☆18Updated 6 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- ☆93Updated 6 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆52Updated 6 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Updated 5 years ago
- ☆70Updated 6 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 5 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆32Updated 5 years ago
- Executes lateral movement through PowerPoint DCOM objects☆19Updated 6 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- ☆21Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆50Updated 6 years ago
- pypykats in your browser☆54Updated 5 years ago
- Enumerate RIDs using pure Python☆31Updated 5 months ago
- F# Implementation to spawn shellcode☆47Updated 6 years ago
- ☆26Updated 6 years ago
- Microsoft Applocker evasion tool☆38Updated 5 years ago
- Library of traffic redirectors☆26Updated 4 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 5 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆45Updated 5 years ago