peewpw / Invoke-PSImageLinks
Encodes a PowerShell script in the pixels of a PNG file and generates a oneliner to execute
☆2,179Updated 5 years ago
Alternatives and similar repositories for Invoke-PSImage
Users that are interested in Invoke-PSImage are comparing it to the libraries listed below
Sorting:
- Mimikatz implementation in pure Python☆3,059Updated 3 weeks ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,730Updated 10 months ago
- PowerShell Obfuscator☆4,009Updated last year
- A tool to abuse Exchange services☆2,244Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,078Updated 2 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,801Updated 4 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,266Updated last year
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,088Updated 10 months ago
- My musings with PowerShell☆2,674Updated 3 years ago
- PowerTools is a collection of PowerShell projects with a focus on offensive operations.☆2,120Updated 3 years ago
- Windows Event Log Killer☆1,789Updated last year
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,877Updated 4 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,843Updated last year
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,846Updated 11 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,549Updated 8 months ago
- MS17-010☆2,192Updated 2 years ago
- Windows Exploit Suggester - Next Generation☆4,492Updated this week
- SMBMap is a handy SMB enumeration tool☆1,921Updated 3 months ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,150Updated 5 months ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,611Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,431Updated 11 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,641Updated 5 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,693Updated 5 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,541Updated 5 years ago
- AntiVirus Evasion Tool☆1,710Updated 2 months ago
- netshell features all in version 2 powershell☆2,251Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,607Updated 6 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,426Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,179Updated last year
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,954Updated this week