giMini / PowerRSALinks
Generate RSA keys, encrypt and decrypt data
☆24Updated 4 years ago
Alternatives and similar repositories for PowerRSA
Users that are interested in PowerRSA are comparing it to the libraries listed below
Sorting:
- Post-explotation Hacks☆14Updated 6 years ago
- ☆21Updated 9 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 10 years ago
- Making shellcode UD - https://osandamalith.com☆25Updated 9 years ago
- ☆22Updated 8 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆27Updated 9 years ago
- ☆65Updated 9 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 2 weeks ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 10 years ago
- Common Malware Techniques☆13Updated 2 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 10 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Updated 7 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- Set of useful scrpts☆10Updated 10 years ago
- ☆16Updated 8 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Updated 7 years ago
- A new technique to bypass microsoft's applocker.☆12Updated 10 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Updated 7 years ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark format☆13Updated 11 years ago
- just a basic rootkit for learning how to playing sys_call_table☆15Updated 9 years ago
- Windows login backdoor diagnostic tool☆11Updated 8 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Updated 9 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- Anti-AV compilation☆44Updated 12 years ago
- ☆53Updated 10 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Updated 5 years ago
- A simple shellcode runner☆22Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆43Updated 9 years ago
- PowerShell script to bypass UAC using DCCW☆19Updated 8 years ago