enigma0x3 / Invoke-LoginPrompt
Invokes a Windows Security Login Prompt and outputs the clear text password.
☆166Updated 8 years ago
Related projects: ⓘ
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆229Updated 6 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆111Updated 7 years ago
- Port of eternal blue exploits to powershell☆148Updated 7 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆314Updated 6 years ago
- A payload stager using PowerShell☆181Updated 4 years ago
- Misc. PowerShell scripts☆115Updated 8 years ago
- Obfuscated Penetration Testing PowerShell scripts☆131Updated 8 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆244Updated 3 years ago
- OFFICE DDEAUTO Payload Generation script☆125Updated 3 years ago
- ☆328Updated this week
- ☆239Updated this week
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆136Updated 5 years ago
- ☆118Updated 8 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆170Updated last year
- Meterpreter Scripts that I'm working on☆171Updated 5 years ago
- PowerDNS: Powershell DNS Delivery☆211Updated 5 years ago
- Inject PowerShell into any process☆219Updated 5 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆198Updated 6 years ago
- Various Cheat Sheets☆179Updated 3 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆282Updated 6 years ago
- Powershell VNC injector☆332Updated 4 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆139Updated 9 years ago
- ☆174Updated 5 years ago
- How To Execute Shellcode via HTA☆135Updated 6 years ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆102Updated 3 years ago
- A command line tool for creating malicious outlook rules☆156Updated 5 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆515Updated last year
- Windows RID Hijacking persistence technique☆164Updated 2 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆145Updated 5 years ago
- Liniaal - A communication extension to Ruler☆96Updated 6 years ago