interference-security / PS2EXE
https://gallery.technet.microsoft.com/PS2EXE-Convert-PowerShell-9e4e07f1
☆13Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for PS2EXE
- ☆16Updated 6 years ago
- A PowerShell binding for the Unicorn Engine☆16Updated 8 years ago
- Gmail Knocker☆21Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 9 years ago
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- radare2 script to help on COM objects reverse engineering☆11Updated 7 years ago
- RemotePSpy provides live monitoring of remote PowerShell sessions, which is particularly useful for older (pre-5.0) versions of PowerShel…☆18Updated 4 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- ☆12Updated 7 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆11Updated 7 years ago
- Execute Shellcode And Other Goodies From MMC☆12Updated 9 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- Set of ultra technical notes about AD☆18Updated 6 years ago
- Custom scripts released for BSidesDC 2016☆14Updated 8 years ago
- module for certexfil☆15Updated 2 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Updated last year
- Tool for automation of GUI-based testing.☆15Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- ☆11Updated 6 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆13Updated 6 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago