rschwass / PSGSHELL
Black Hills Info Sec has a great tool on Byt3Bl33d3rs github utilizing Gmail as C2 tansport. Using that Idea I wanted something that did the same with powershell.
☆12Updated 8 years ago
Alternatives and similar repositories for PSGSHELL:
Users that are interested in PSGSHELL are comparing it to the libraries listed below
- ☆53Updated 9 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- Executes PowerShell from an unmanaged process☆28Updated 10 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- MS15-076 Privilege Escalation☆16Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Windows PowerShell domain scanning tool☆54Updated 8 years ago
- The AwesomerShell Code Sample☆50Updated 9 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Offensive Data Storage☆58Updated 8 years ago
- NCC Group Ransomware Simulator☆69Updated 8 years ago
- An offensive Powershell console☆30Updated 9 years ago
- Mutable Universal Relay Document Kit☆17Updated 10 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Gmail Knocker☆21Updated 7 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- ☆19Updated 7 years ago
- meterpreter connetion☆22Updated 7 years ago
- post-exploitation tools☆15Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Powershell Persistence Locator☆66Updated 8 years ago
- ☆51Updated 6 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆77Updated 9 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆26Updated 9 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆30Updated 8 years ago
- ☆97Updated 8 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 7 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago