enigma0x3 / PowershellProfileLinks
Abuses Powershell Profiles
☆13Updated 9 years ago
Alternatives and similar repositories for PowershellProfile
Users that are interested in PowershellProfile are comparing it to the libraries listed below
Sorting:
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- ☆25Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Gmail Knocker☆23Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- ☆21Updated 7 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 10 years ago