peewpw / Invoke-BSOD
For when you want a computer to be done - without admin!
☆300Updated 7 years ago
Alternatives and similar repositories for Invoke-BSOD
Users that are interested in Invoke-BSOD are comparing it to the libraries listed below
Sorting:
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".☆391Updated 5 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆345Updated 5 months ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆175Updated 8 years ago
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆141Updated last year
- A collection of tools for overwriting the MBR (Master Boot Record) of a machine with another file.☆20Updated 11 years ago
- random powershell goodness☆447Updated 5 months ago
- ☆216Updated 7 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆307Updated 5 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆328Updated last year
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆390Updated 7 years ago
- Executable that mutates its own code☆377Updated 5 months ago
- A proof of concept for dynamically loading .net assemblies at runtime with only a minimal convention pre-knowledge☆162Updated 6 years ago
- Process Injection☆761Updated 3 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆325Updated 6 years ago
- Python / C# Unmanaged PowerShell based RAT☆777Updated 2 years ago
- This is a weaponized WSUS exploit☆285Updated 2 years ago
- Tool to create hidden registry keys.☆480Updated 5 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆228Updated 5 years ago
- ☆616Updated 4 years ago
- A Powershell Privilege Escalation Enumeration Script.☆310Updated 7 years ago
- A simple utility to convert EXE files to JPEG images and vice versa.☆200Updated 9 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆317Updated 4 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆227Updated 7 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆132Updated 4 years ago
- A set of scripts that demonstrate how to perform memory injection in C#☆313Updated 7 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆252Updated 6 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆380Updated 5 years ago
- The full story of the CLR implementation of Meterpreter☆150Updated 4 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆369Updated last year
- ☆253Updated 6 years ago