This script dynamically decodes and executes a Base64 encoded Mimikatz script, allowing users to bypass security measures and run specified Mimikatz commands.
☆21Jul 9, 2024Updated last year
Alternatives and similar repositories for Invoke-Mimikatz-Bypass
Users that are interested in Invoke-Mimikatz-Bypass are comparing it to the libraries listed below
Sorting:
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- ☆18Jun 25, 2024Updated last year
- ☆27Mar 6, 2025Updated last year
- Developing an open source Windows EDR written in C & C++ & C#☆27Feb 23, 2026Updated 2 weeks ago
- Self Delete DLL☆23Feb 15, 2024Updated 2 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆25Jul 26, 2024Updated last year
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- ☆30Aug 24, 2025Updated 6 months ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Mar 25, 2021Updated 4 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- ☆46Dec 23, 2024Updated last year
- Exploit for the CVE-2024-5806☆45Jun 24, 2024Updated last year
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Library to interact with Omniva courier API☆13Mar 29, 2024Updated last year
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- ☆12Jul 4, 2024Updated last year
- ☆10Nov 21, 2023Updated 2 years ago
- Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.☆10Apr 25, 2025Updated 10 months ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- OSCP material tools and helpful scripts.☆11Mar 14, 2025Updated 11 months ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- Angular pipe for cutting translations ✂️ 🌍 (plugin for ngx-translate)☆12Updated this week
- A Docker lab integrating Splunk SIEM with Ollama LLM via Model Context Protocol for AI-powered security operations. Features Promptfoo e…☆18Aug 17, 2025Updated 6 months ago
- ☆14Dec 6, 2023Updated 2 years ago
- Oracle cascade delete☆10Jun 8, 2021Updated 4 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 3 years ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- Your new favorite tool for pentesting.☆10Jul 31, 2024Updated last year
- ☆10Jun 15, 2024Updated last year
- ☆12Feb 20, 2025Updated last year
- RDP over WebSocket | WebRTC☆12Nov 8, 2021Updated 4 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆14Jun 7, 2024Updated last year
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago