Bypass Constrained Language Mode in PowerShell
☆29May 21, 2019Updated 6 years ago
Alternatives and similar repositories for CLMBypass
Users that are interested in CLMBypass are comparing it to the libraries listed below
Sorting:
- c# reverse shell poc☆26Dec 22, 2025Updated 2 months ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆34Feb 15, 2026Updated 2 weeks ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- This code was used for the blogpost on secjuice.☆42Apr 17, 2019Updated 6 years ago
- ☆21Dec 1, 2021Updated 4 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆12Aug 22, 2025Updated 6 months ago
- Get SYSTEM via SeDebugPrivilege☆24Jun 6, 2022Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- ☆33Jan 23, 2025Updated last year
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Feb 23, 2021Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Android webviews and securiy☆23Sep 18, 2025Updated 5 months ago
- ☆48Mar 19, 2020Updated 5 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- Red Team Coin for crypto-mining operations.☆23Jan 12, 2026Updated last month
- Shellcode execution for memflow☆13Apr 11, 2022Updated 3 years ago
- httpscan 用于C段http资产快速扫描,目前只支持80端口。(多线程)☆10Jan 20, 2022Updated 4 years ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆19Aug 5, 2025Updated 6 months ago
- Freaking Injector is a tool which made for injecting dlls into other processes in Windows x64 systems with bunch of diffrent injection me…☆11Dec 3, 2020Updated 5 years ago
- Powershell script to get all user devices registered in SCCM.☆15Jul 23, 2021Updated 4 years ago
- A small collection of scripts that are useful for implementing Domain Fronting in an assessment.☆14Apr 25, 2019Updated 6 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump☆24Jul 6, 2023Updated 2 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆96May 9, 2023Updated 2 years ago
- Crawl (~600K) labeled Portable Exe files from Microsoft Cabs☆14Jul 31, 2021Updated 4 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- ☆81Dec 24, 2021Updated 4 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Jul 7, 2021Updated 4 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- Collection of remote authentication triggers in C#☆524May 15, 2024Updated last year
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- ☆13May 27, 2020Updated 5 years ago