Cloak files using text based steganography output to obsfucate what data they contain. Coded in Powershell. This is a port of TryCatchHCF's Cloakify written in python
☆44Feb 6, 2021Updated 5 years ago
Alternatives and similar repositories for Cloakify-Powershell
Users that are interested in Cloakify-Powershell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Jul 16, 2017Updated 8 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆55Oct 25, 2018Updated 7 years ago
- PowerShell to Slack C2☆109May 31, 2018Updated 7 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- http://vcloud-lab.com☆12Feb 14, 2018Updated 8 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Platform independent library for interfacing windows security descriptors☆23Jan 2, 2026Updated 2 months ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- A simple Powershell Module to help people managing Active Directory Shadow Group☆15May 15, 2019Updated 6 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- A PowerShell module for monitoring network links using iPerf.☆19Mar 9, 2020Updated 6 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- A PowerShell module with functions to help calculate working hours, and for generally working with or calculating business hours / date t…☆11Oct 5, 2022Updated 3 years ago
- A PowerShell function to report admnistrative events☆16Mar 10, 2017Updated 9 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- A tool to run .Net DLLs from the command line☆105Oct 23, 2018Updated 7 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆56Jan 30, 2023Updated 3 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- ☆39Oct 8, 2019Updated 6 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago