E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward
☆132Nov 7, 2024Updated last year
Alternatives and similar repositories for psc
Users that are interested in psc are comparing it to the libraries listed below
Sorting:
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 4 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆98Sep 28, 2025Updated 5 months ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Linux x86_64 Process Injection Utility☆58Mar 9, 2021Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Sep 11, 2021Updated 4 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Extendable payload obfuscation and delivery framework☆146Nov 4, 2022Updated 3 years ago
- Apply a filter to the events being reported by windows event logging☆262Apr 24, 2021Updated 4 years ago
- Get root via TTY / TIOCSTI stuffing☆77May 12, 2025Updated 9 months ago
- Norimaci is a simple and lightweight malware analysis sandbox for macOS☆71Mar 3, 2020Updated 5 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆205Jul 2, 2024Updated last year
- PowerShell Clipboard Data Transfer☆73Dec 29, 2025Updated 2 months ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆284Oct 29, 2024Updated last year
- A simple, pure JavaScript implementation decoding PowerShell's SecureString objects for analysis.☆30Mar 31, 2023Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Java XMLDecoder payload generator☆16Jul 27, 2021Updated 4 years ago
- SHELLING - a comprehensive OS command injection payload generator☆446Mar 16, 2020Updated 5 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Oct 10, 2020Updated 5 years ago
- ☆433Aug 17, 2022Updated 3 years ago
- Post exploitation tool for configuration management servers.☆77Jan 29, 2026Updated last month
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Oct 24, 2023Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆228Jul 30, 2021Updated 4 years ago
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆125Nov 14, 2022Updated 3 years ago
- Core A2P2V functionality (command line based)☆68May 14, 2024Updated last year
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- Beacon Object Files.☆36Feb 26, 2024Updated 2 years ago
- ☆10Nov 30, 2020Updated 5 years ago