matthewdunwoody / POSHSPYView external linksLinks
POSHSPY backdoor code
☆46Apr 4, 2017Updated 8 years ago
Alternatives and similar repositories for POSHSPY
Users that are interested in POSHSPY are comparing it to the libraries listed below
Sorting:
- ☆10Jan 4, 2015Updated 11 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- ☆17Oct 15, 2017Updated 8 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- replaces fish history with a history tailored to pentesters for efficency and newbie pentesters for learning. this is also useful for beg…☆54Jul 4, 2016Updated 9 years ago
- ☆432May 3, 2023Updated 2 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆162Apr 11, 2017Updated 8 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Avoidz tool to bypass most A.V softwares☆139Sep 28, 2017Updated 8 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- ☆13Apr 23, 2018Updated 7 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- C++ library for detecting Visual C++ runtimes on Windows XP and later.☆18Jul 7, 2014Updated 11 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- ☆80Sep 27, 2015Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- UI used to manage Permanent WMI Event Consumers☆14Mar 21, 2015Updated 10 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- A dsniff project using bro☆11Jan 25, 2016Updated 10 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- ☆29Jun 17, 2020Updated 5 years ago
- A command shell wrapper using only WMI for Microsoft Windows☆334Jun 24, 2017Updated 8 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Oct 6, 2017Updated 8 years ago
- http://vcloud-lab.com☆12Feb 14, 2018Updated 8 years ago
- Paros proxy server☆11Feb 21, 2014Updated 11 years ago