peewpw / Invoke-BSODLinks
For when you want a computer to be done - without admin!
☆310Updated 7 years ago
Alternatives and similar repositories for Invoke-BSOD
Users that are interested in Invoke-BSOD are comparing it to the libraries listed below
Sorting:
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆141Updated 5 months ago
- This is a tool that recovers WPA2 Enterprise Wifi Credentials from a machine.☆106Updated 6 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆178Updated 9 years ago
- ☆619Updated 5 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆358Updated last year
- A decoder for Petya victim keys, using the Janus' masterkey.☆60Updated 3 years ago
- Inject PowerShell into any process☆244Updated 6 years ago
- ☆147Updated 6 years ago
- A General Purpose DLL & Code Injection Utility☆157Updated 7 years ago
- random powershell goodness☆455Updated last year
- A PowerShell module that contains different functions that can be used for pranking your fellow co-worker or anyone else for that matter.☆62Updated 3 years ago
- Executable that mutates its own code☆393Updated 5 months ago
- Windows RID Hijacking persistence technique☆176Updated last year
- Automatically exported from code.google.com/p/creddump☆272Updated 6 years ago
- Word 2016 vulnerability allows injecting HTML/JS code into a docx file's embeddedHTML="" tags.☆96Updated 6 years ago
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".☆397Updated 5 years ago
- Powershell VNC injector☆340Updated 5 years ago
- Meterpreter Encrypted Payload by C#☆165Updated 2 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Updated 5 years ago
- Get chrome passwords from chrome database in powershell☆32Updated 6 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆234Updated 6 years ago
- A set of scripts that demonstrate how to perform memory injection in C#☆315Updated 8 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆309Updated 6 years ago
- ☆233Updated 8 years ago
- The full story of the CLR implementation of Meterpreter☆153Updated 5 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆115Updated 4 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆349Updated this week
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆124Updated 6 years ago
- Fileless Ransomware Example☆37Updated 8 years ago
- Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!☆211Updated 4 years ago