peewpw / Invoke-BSODLinks
For when you want a computer to be done - without admin!
☆307Updated 7 years ago
Alternatives and similar repositories for Invoke-BSOD
Users that are interested in Invoke-BSOD are comparing it to the libraries listed below
Sorting:
- ☆619Updated 5 years ago
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆141Updated 3 months ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆60Updated 3 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆177Updated 9 years ago
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".☆397Updated 5 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆352Updated 10 months ago
- random powershell goodness☆456Updated 10 months ago
- Inject PowerShell into any process☆238Updated 6 years ago
- Persisting in the Windows registry "invisibly"☆340Updated 7 years ago
- Python script to decrypt saved Chrome usernames and passwords on windows☆287Updated 4 years ago
- A General Purpose DLL & Code Injection Utility☆156Updated 7 years ago
- Powershell VNC injector☆339Updated 5 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆236Updated 6 years ago
- Executable that mutates its own code☆379Updated 2 months ago
- This is a tool that recovers WPA2 Enterprise Wifi Credentials from a machine.☆102Updated 6 years ago
- Meterpreter Encrypted Payload by C#☆165Updated 2 years ago
- Capcom Rootkit POC☆200Updated 8 years ago
- Windows RID Hijacking persistence technique☆176Updated 10 months ago
- ☆147Updated 6 years ago
- The full story of the CLR implementation of Meterpreter☆152Updated 5 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆307Updated 6 years ago
- A simple utility to convert EXE files to JPEG images and vice versa.☆202Updated 10 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆124Updated 6 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆328Updated 2 years ago
- Searches for strings, regex, credit card numbers of magnetic stripe card tracks in a Windows process's memory space☆125Updated 4 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆96Updated last year
- This is a weaponized WSUS exploit☆290Updated 2 years ago
- A set of scripts that demonstrate how to perform memory injection in C#☆315Updated 7 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆370Updated last year
- DLL Password Filter Implant with Exfiltration Capabilities☆138Updated 5 years ago