malwarekid / PWSH-Env-Enc
This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially useful when dealing with PowerShell commands containing characters like ', ", or $.
☆16Updated 10 months ago
Alternatives and similar repositories for PWSH-Env-Enc:
Users that are interested in PWSH-Env-Enc are comparing it to the libraries listed below
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 9 months ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- ☆14Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated last year
- Phishing Framework for OTP codes☆18Updated 2 weeks ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- ☆16Updated 10 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 5 months ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆11Updated 3 months ago
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆42Updated 7 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Template Nuclei SSTI☆29Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 9 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- ☆23Updated 3 months ago
- ☆42Updated 2 years ago
- Basic script to generate reverse shell payloads, generally most used in ctf.☆28Updated 11 months ago
- Creating a Malicious Macro using MS Word☆19Updated 2 years ago
- Azure Service Subdomain Enumeration☆55Updated 6 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆44Updated 2 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆47Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago