peewpw / Invoke-BSODLinks
For when you want a computer to be done - without admin!
â305Updated 7 years ago
Alternatives and similar repositories for Invoke-BSOD
Users that are interested in Invoke-BSOD are comparing it to the libraries listed below
Sorting:
- đâđ¨ This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.â141Updated 2 months ago
- A General Purpose DLL & Code Injection Utilityâ155Updated 7 years ago
- â619Updated 5 years ago
- Deobfuscate batch scripts obfuscated using string substitution and escape character techniques.â162Updated 2 years ago
- Persisting in the Windows registry "invisibly"â341Updated 7 years ago
- Decompile of the Solorwinds "SUNBURST" Trojan associated with Campaign UNC2452 This is the SolarWinds.Orion.Core.BusinessLayer.dll file fâŚâ44Updated 4 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.â176Updated 9 years ago
- Inject PowerShell into any processâ237Updated 6 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into aâŚâ352Updated 9 months ago
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".â396Updated 5 years ago
- A list of ways to execute code on Windows using legitimate Windows toolsâ307Updated 6 years ago
- The full story of the CLR implementation of Meterpreterâ153Updated 5 years ago
- random powershell goodnessâ455Updated 9 months ago
- A decoder for Petya victim keys, using the Janus' masterkey.â57Updated 3 years ago
- Executable that mutates its own codeâ379Updated 2 months ago
- PoC Thread Execution Hijacking for Win32 Code Injectionâ178Updated last year
- Meterpreter Encrypted Payload by C#â164Updated 2 years ago
- Windows RID Hijacking persistence techniqueâ175Updated 9 months ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1â125Updated 6 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilitiesâ235Updated 6 years ago
- Stealthy backdoor for Windows operating systemsâ284Updated 5 years ago
- DLL Password Filter Implant with Exfiltration Capabilitiesâ138Updated 5 years ago
- Pazuzu: Reflective DLL to run binaries from memoryâ216Updated 5 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUDâ129Updated 4 years ago
- Word 2016 vulnerability allows injecting HTML/JS code into a docx file's embeddedHTML="" tags.â96Updated 6 years ago
- â147Updated 6 years ago
- exe2powershell - exe2bat reborn for modern Windowsâ171Updated 4 years ago
- A set of scripts that demonstrate how to perform memory injection in C#â315Updated 7 years ago
- Powershell VNC injectorâ339Updated 5 years ago
- Fileless Ransomware Exampleâ36Updated 8 years ago