mxngel / GoAmsiKiller
☆14Updated last year
Alternatives and similar repositories for GoAmsiKiller:
Users that are interested in GoAmsiKiller are comparing it to the libraries listed below
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- A Moodle Scanner☆38Updated 2 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 7 months ago
- PowerShell Reverse Shell☆61Updated last year
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 2 months ago
- A C2 framework built for my bachelors thesis☆55Updated 2 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- Phishing Framework for OTP codes☆18Updated 3 weeks ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆78Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆30Updated last month
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- Brief writeup of post exploitation methodologies.☆17Updated last year
- Inject RDPThief into memory with PowerShell.☆58Updated last week
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆44Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 4 months ago
- ☆34Updated last year
- Situational Awareness script to identify how and where to run implants☆43Updated last month
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- Simple netexec wraper with html repport☆17Updated 8 months ago
- ☆51Updated 11 months ago
- ☆47Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 7 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆42Updated 3 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆43Updated last year