A solution to create obfuscated shellcode from msfvenom for PowerShell.
☆26Aug 3, 2022Updated 3 years ago
Alternatives and similar repositories for Get-Shellcode
Users that are interested in Get-Shellcode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A solution to create obfuscated download cradles for PowerShell.☆16Aug 1, 2022Updated 3 years ago
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆286Aug 5, 2022Updated 3 years ago
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆14Nov 30, 2022Updated 3 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Oct 6, 2022Updated 3 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆24Feb 17, 2024Updated 2 years ago
- Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)☆20Feb 16, 2021Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- POC Pdf-exploit builder on C#☆13Mar 1, 2024Updated 2 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆27Mar 13, 2023Updated 3 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Jan 16, 2021Updated 5 years ago
- You don't need wires to be connected☆43Apr 8, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Decrypt encrypted passwords in EmailProvider.db on samsung phones.☆13Aug 14, 2017Updated 8 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- Runs sshd as a unprivileged user for persistence☆10Jun 23, 2019Updated 6 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- Token impersonation in PowerShell to execute under the context of another user.☆25Oct 14, 2025Updated 6 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆30Feb 15, 2026Updated 2 months ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- Making Shellcode fully undetectable using uuid☆23May 7, 2021Updated 4 years ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- A keygen for Specter Insight C2☆48Feb 17, 2025Updated last year
- Multiplatform Telegram Bot in pure PowerShell☆56Dec 1, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Gitosint is a tool for reconnaissance of the Git services and extracting valuable metadata from commits.☆14Aug 22, 2021Updated 4 years ago
- bash script for automating subdomain enumeration process either passive or active☆30Feb 24, 2026Updated 2 months ago
- Original PoC for CVE-2023-30367☆17Jan 4, 2024Updated 2 years ago
- This repo covers some code execution and AV Evasion methods for Macros in Office documents☆1,266Jan 27, 2022Updated 4 years ago
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago