t1Sh1n4 / Invoke-SPSIView external linksLinks
Invoke-SPSI - Simple PowerShell Shellcode Injector
☆37Oct 9, 2025Updated 4 months ago
Alternatives and similar repositories for Invoke-SPSI
Users that are interested in Invoke-SPSI are comparing it to the libraries listed below
Sorting:
- PowerShell Script to automatically abuse the BadSuccessor vulnerability (CVE-2025-53779)☆44Nov 19, 2025Updated 2 months ago
- Red Team Coin for crypto-mining operations.☆23Jan 12, 2026Updated last month
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 6 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- Convert binaries to shellcode (C, C#, CPP, ASM, BOF loader, PS to b64)☆18Jun 6, 2025Updated 8 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated 11 months ago
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆57Jan 14, 2026Updated 3 weeks ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 6 months ago
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆83Feb 2, 2026Updated last week
- a repository that contains the program.cs source file that has D/Invoke bare minimum implementation and AES encryption for shellcode exec…☆23Feb 25, 2023Updated 2 years ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆99Jul 9, 2025Updated 7 months ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- A portable C# utility for enumerating local and remote windows sessions☆55Jan 1, 2026Updated last month
- Advanced malware sandbox evasion using C☆17Jan 23, 2026Updated 3 weeks ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved funct…☆92Jan 26, 2026Updated 2 weeks ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆12Aug 22, 2025Updated 5 months ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- Parses nessus vulnerability scan data to streamline CVE POC lookups☆13Mar 13, 2025Updated 11 months ago
- ☆25Oct 13, 2025Updated 4 months ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆11Nov 24, 2022Updated 3 years ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆14Aug 7, 2023Updated 2 years ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆47Feb 1, 2026Updated last week
- Orsted C2 Framework☆112Updated this week
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆12Jan 4, 2026Updated last month
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 5 months ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- This is a simple python binding of Stag Fiducial Marker Detection System☆12Mar 7, 2022Updated 3 years ago
- UI for Seo-Rii/Webtoon_Downloader☆12Jan 7, 2023Updated 3 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago