rschwass / PSGSHELLLinks
Black Hills Info Sec has a great tool on Byt3Bl33d3rs github utilizing Gmail as C2 tansport. Using that Idea I wanted something that did the same with powershell.
☆12Updated 9 years ago
Alternatives and similar repositories for PSGSHELL
Users that are interested in PSGSHELL are comparing it to the libraries listed below
Sorting:
- Offensive Data Storage☆61Updated 9 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Updated 8 years ago
- Listening Post for Throwback Implant☆110Updated 9 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆103Updated 8 years ago
- ☆97Updated 9 years ago
- Executes PowerShell from an unmanaged process☆29Updated 10 years ago
- ☆113Updated 8 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 8 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 8 years ago
- Powershell Persistence Locator☆66Updated 9 years ago
- ☆53Updated 10 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆87Updated 7 years ago
- ☆59Updated 6 years ago
- ☆120Updated 9 years ago
- Mutable Universal Relay Document Kit☆17Updated 10 years ago
- NCC Group Ransomware Simulator☆69Updated 9 years ago
- An offensive Powershell console☆30Updated 9 years ago
- ☆52Updated 7 years ago
- Interactive remote PowerShell Payload☆78Updated 9 years ago
- A command line tool for creating malicious outlook rules☆165Updated 6 years ago
- Powershell Empire Persistence finder☆120Updated 8 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆88Updated 8 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- A powershell script for creating a Windows honeyport.☆89Updated 5 months ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Updated 9 years ago
- Powershell MS Outlook enumeration and phishing tool☆77Updated 9 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆38Updated 7 years ago
- ☆80Updated 9 years ago
- ☆83Updated 9 years ago