peewpw / Invoke-BSODLinks
For when you want a computer to be done - without admin!
☆304Updated 7 years ago
Alternatives and similar repositories for Invoke-BSOD
Users that are interested in Invoke-BSOD are comparing it to the libraries listed below
Sorting:
- ☆618Updated 5 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆177Updated 9 years ago
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆140Updated 3 weeks ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆352Updated 7 months ago
- Inject PowerShell into any process☆234Updated 6 years ago
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".☆392Updated 5 years ago
- The full story of the CLR implementation of Meterpreter☆151Updated 4 years ago
- A General Purpose DLL & Code Injection Utility☆154Updated 7 years ago
- This is a tool that recovers WPA2 Enterprise Wifi Credentials from a machine.☆103Updated 6 years ago
- Persisting in the Windows registry "invisibly"☆341Updated 6 years ago
- Python script to decrypt saved Chrome usernames and passwords on windows☆286Updated 4 years ago
- ☆147Updated 5 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆307Updated 6 years ago
- Executable that mutates its own code☆378Updated 2 weeks ago
- random powershell goodness☆454Updated 7 months ago
- exe2powershell - exe2bat reborn for modern Windows☆171Updated 4 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 5 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆370Updated last year
- A simple utility to convert EXE files to JPEG images and vice versa.☆201Updated 9 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆231Updated 6 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆328Updated 2 years ago
- This is a weaponized WSUS exploit☆285Updated 2 years ago
- Windows RID Hijacking persistence technique☆175Updated 7 months ago
- Windows UAC Bypass☆98Updated 6 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆322Updated 8 years ago
- PowerDNS: Powershell DNS Delivery☆213Updated 6 years ago
- Powershell VNC injector☆338Updated 5 years ago
- Meterpreter Encrypted Payload by C#☆164Updated 2 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Updated 11 months ago
- A PowerShell module that contains different functions that can be used for pranking your fellow co-worker or anyone else for that matter.☆63Updated 3 years ago