peewpw / Invoke-BSODLinks
For when you want a computer to be done - without admin!
☆309Updated 7 years ago
Alternatives and similar repositories for Invoke-BSOD
Users that are interested in Invoke-BSOD are comparing it to the libraries listed below
Sorting:
- ☆619Updated 5 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆179Updated 9 years ago
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆142Updated 6 months ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆358Updated last year
- Executable that mutates its own code☆394Updated 5 months ago
- This is a tool that recovers WPA2 Enterprise Wifi Credentials from a machine.☆106Updated 7 years ago
- Meterpreter Encrypted Payload by C#☆164Updated 2 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆233Updated 6 years ago
- A General Purpose DLL & Code Injection Utility☆157Updated 7 years ago
- The full story of the CLR implementation of Meterpreter☆153Updated 5 years ago
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".☆398Updated 5 years ago
- Windows RID Hijacking persistence technique☆177Updated last year
- random powershell goodness☆457Updated last year
- Powershell VNC injector☆341Updated 5 years ago
- Inject PowerShell into any process☆245Updated 6 years ago
- ☆147Updated 6 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆309Updated 6 years ago
- Windows UAC Bypass☆99Updated 6 years ago
- Python script to decrypt saved Chrome usernames and passwords on windows☆286Updated 4 years ago
- Word 2016 vulnerability allows injecting HTML/JS code into a docx file's embeddedHTML="" tags.☆96Updated 7 years ago
- This is a weaponized WSUS exploit☆297Updated 3 years ago
- A simple utility to convert EXE files to JPEG images and vice versa.☆203Updated 10 years ago
- exe2powershell - exe2bat reborn for modern Windows☆175Updated 5 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆327Updated 6 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆647Updated 6 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆352Updated 3 weeks ago
- Fileless Ransomware Example☆37Updated 8 years ago
- A proof of concept for dynamically loading .net assemblies at runtime with only a minimal convention pre-knowledge☆163Updated 7 years ago
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆396Updated 7 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆61Updated 3 years ago