enigma0x3 / PowershellProfile
Abuses Powershell Profiles
☆13Updated 9 years ago
Alternatives and similar repositories for PowershellProfile:
Users that are interested in PowershellProfile are comparing it to the libraries listed below
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- ☆25Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Gmail Knocker☆21Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 8 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Generates anti-sandbox analysis HTA files without payloads☆15Updated 8 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Search bing with python☆12Updated 10 years ago
- ☆10Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 4 months ago
- ☆18Updated 7 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 4 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆15Updated 9 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- Generic malicious browser check written in C#☆13Updated 8 years ago