n0tspam / RunspaceLoader
Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe
☆13Updated last year
Alternatives and similar repositories for RunspaceLoader:
Users that are interested in RunspaceLoader are comparing it to the libraries listed below
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 9 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 9 months ago
- ☆54Updated last month
- in-process powershell runner for BRC4☆44Updated last year
- ☆47Updated 2 years ago
- Source code and examples for PassiveAggression☆55Updated 9 months ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆13Updated 2 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆11Updated last month
- ☆53Updated 5 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- ☆59Updated last year
- Enumerate the Domain for Readable and Writable Shares☆17Updated last month
- Tool to aid in dumping LSASS process remotely☆38Updated 7 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆55Updated 3 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆23Updated 2 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- ☆43Updated 8 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆82Updated 5 months ago
- Lsass dumper evading (some) EDR detection☆21Updated last month
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆54Updated 3 years ago
- Python3 rewrite of AsOutsider features of AADInternals☆43Updated 3 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆24Updated 2 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- time-based user enum via Basic Auth in Azure against Autodiscover☆32Updated 5 months ago