Bypass Constrained Language Mode in PowerShell
☆29May 21, 2019Updated 6 years ago
Alternatives and similar repositories for CLMBypass
Users that are interested in CLMBypass are comparing it to the libraries listed below
Sorting:
- c# reverse shell poc☆26Dec 22, 2025Updated 3 months ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆34Feb 15, 2026Updated last month
- ☆21Dec 1, 2021Updated 4 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- This code was used for the blogpost on secjuice.☆43Apr 17, 2019Updated 6 years ago
- (l)user friendly WinDBG theme.☆20Mar 16, 2019Updated 7 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- ☆39Oct 2, 2021Updated 4 years ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆13Aug 22, 2025Updated 7 months ago
- Get SYSTEM via SeDebugPrivilege☆24Jun 6, 2022Updated 3 years ago
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆96May 9, 2023Updated 2 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- juicypotato for win10 > 1803 & win server 2019☆97Feb 23, 2021Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Jul 7, 2021Updated 4 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆33Jan 23, 2025Updated last year
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- Android webviews and securiy☆23Sep 18, 2025Updated 6 months ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- httpscan 用于C段http资产快速扫描,目前只支持80端口。(多线程)☆10Jan 20, 2022Updated 4 years ago
- Bypass for PowerShell Constrained Language Mode☆406Dec 23, 2021Updated 4 years ago
- Python Script to Exploit SpoolService/Printer Bug on Exchange - Thanks to @3xocyte☆22Sep 2, 2019Updated 6 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Red Team Coin for crypto-mining operations.☆23Mar 1, 2026Updated 3 weeks ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- ☆13Jun 26, 2021Updated 4 years ago
- ☆82Dec 24, 2021Updated 4 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 2 years ago
- A fake AMSI Provider which can be used for persistence.☆156May 16, 2021Updated 4 years ago