PowerShell SOCKS proxy with reverse proxy capabilities
☆84Apr 23, 2021Updated 4 years ago
Alternatives and similar repositories for PowerProxy
Users that are interested in PowerProxy are comparing it to the libraries listed below
Sorting:
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- Socks proxy, and reverse socks server using powershell.☆805Dec 9, 2025Updated 2 months ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- Single executable reverse SOCKS5 proxy written in Golang.☆147Oct 27, 2025Updated 4 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,192Jan 20, 2023Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆398Aug 15, 2025Updated 6 months ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- ☆39Sep 26, 2022Updated 3 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Oct 10, 2020Updated 5 years ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆730Sep 3, 2025Updated 6 months ago
- A BOF to automate common persistence tasks for red teamers☆292Mar 7, 2023Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆238Jan 26, 2022Updated 4 years ago
- Finding secrets in kernel and user memory☆117Sep 6, 2023Updated 2 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 7 months ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Nov 19, 2022Updated 3 years ago
- ☆198Mar 19, 2020Updated 5 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆220Mar 30, 2022Updated 3 years ago
- .Net port of the remote SAM + LSA Secrets dumping functionality of impacket's secretsdump.py☆607Feb 16, 2023Updated 3 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆88Jun 24, 2022Updated 3 years ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆459Mar 25, 2024Updated last year
- PowerShell scripts for communicating with a remote host.☆303Apr 27, 2023Updated 2 years ago
- ☆477Nov 20, 2022Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆767Dec 2, 2024Updated last year
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- ☆17Apr 5, 2021Updated 4 years ago