gh0x0st / Get-DownloadCradleLinks
A solution to create obfuscated download cradles for PowerShell.
☆16Updated 3 years ago
Alternatives and similar repositories for Get-DownloadCradle
Users that are interested in Get-DownloadCradle are comparing it to the libraries listed below
Sorting:
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
 - A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆20Updated 3 years ago
 - PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 7 months ago
 - A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
 - Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
 - PoCs of (outdated) privilege escalation vulnerability☆13Updated 10 months ago
 - AMSI Bypass for powershell☆29Updated 3 years ago
 - ☆28Updated 2 years ago
 - Token Elevation to authorized user as SYSTEM or Domain Admins☆24Updated 2 years ago
 - Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago
 - Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 3 years ago
 - This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
 - ☆60Updated last year
 - A port of classic netcat to C#☆33Updated 2 years ago
 - Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Updated 2 years ago
 - A swiss army knife for pentesting networks☆26Updated 3 years ago
 - A .NET binary loader that bypasses AMSI☆45Updated 4 years ago
 - An offensive security framework for writing payloads☆18Updated 3 years ago
 - Windows internals and exploitation tricks☆105Updated 4 months ago
 - Collection of Offensive C# Tooling☆12Updated 4 years ago
 - Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
 - Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆19Updated 2 years ago
 - Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Updated 7 months ago
 - Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Updated 2 years ago
 - Random☆34Updated 2 years ago
 - A curated list of tools and techniques written from experience in weaponization of malware☆38Updated 2 years ago
 - ☆16Updated 5 years ago
 - Weaponizing CLRvoyance for Post-Ex .NET Execution☆37Updated 4 years ago
 - Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
 - A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Updated 5 years ago