enigma0x3 / PowershellProfile
Abuses Powershell Profiles
☆13Updated 9 years ago
Alternatives and similar repositories for PowershellProfile:
Users that are interested in PowershellProfile are comparing it to the libraries listed below
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 7 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Gmail Knocker☆21Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- ☆25Updated 6 years ago
- Random code snippets☆9Updated last year
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Miscellaneous for various things☆22Updated 3 months ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 7 years ago
- Random stuff☆16Updated 6 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- Assists in mass exportation of Nessus scans☆19Updated 6 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- Scan MSSQL databases for payment card data without relying on key words☆18Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago