powershell tool for VM evasion
☆41Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for invoke-antivm
Users that are interested in invoke-antivm are comparing it to the libraries listed below
Sorting:
- Tool to manipulate and weaponize Office Open XML documents.☆71Mar 27, 2023Updated 2 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- ☆46Mar 20, 2021Updated 4 years ago
- Execute .Net assemblies using Rundll32.exe☆115Mar 17, 2021Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91May 10, 2020Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆32Oct 11, 2020Updated 5 years ago
- A C# port of the MinHook API hooking library☆55Oct 5, 2022Updated 3 years ago
- Security checks for your researches☆34Nov 22, 2020Updated 5 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- The program is designed to obfuscate the shellcode.☆203Jul 13, 2021Updated 4 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- VBScript minifier☆25Jan 9, 2026Updated last month
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- A robust tunelling solution written in golang☆274May 17, 2023Updated 2 years ago
- ☆14May 20, 2019Updated 6 years ago
- "Useable" tool to share secrets via shamir secret sharing and NaCL.☆14Sep 19, 2018Updated 7 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- SOLID principles using modern C++☆10Dec 11, 2021Updated 4 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Oct 10, 2020Updated 5 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆218Dec 8, 2022Updated 3 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- #crypto #cipher #encode #decode #hash☆52Mar 27, 2021Updated 4 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago