t3l3machus / PowerShell-Obfuscation-BibleLinks
A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository are the result of personal research, including reading materials online and conducting trial-and-error attempts in labs and pentests.
☆1,129Updated last year
Alternatives and similar repositories for PowerShell-Obfuscation-Bible
Users that are interested in PowerShell-Obfuscation-Bible are comparing it to the libraries listed below
Sorting:
- Windows Local Privilege Escalation Cookbook☆1,249Updated 11 months ago
- Dominate Active Directory with PowerShell.☆1,153Updated last month
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆808Updated 9 months ago
- C2 infrastructure over Microsoft Teams.☆735Updated last year
- Awesome EDR Bypass Resources For Ethical Hacking☆1,441Updated 3 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,272Updated 2 months ago
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆470Updated 10 months ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques and used by Patchwork group.☆831Updated last year
- EDR Lab for Experimentation Purposes☆1,399Updated 2 months ago
- ☆714Updated last year
- Simple & Powerful PowerShell Script Obfuscator☆589Updated 8 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆746Updated 2 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆513Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,140Updated last week
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆937Updated 4 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,800Updated last year
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆605Updated 5 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆739Updated 7 months ago
- Dumping DPAPI credz remotely☆1,294Updated 9 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,100Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,011Updated last week
- Red Team Cheatsheet in constant expansion.☆1,253Updated 2 years ago
- Powershell tool to automate Active Directory enumeration.☆1,268Updated 4 months ago
- PEN-300 collection to help you on your exam.☆682Updated 5 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,160Updated last week
- Script for generating revshells☆478Updated last year
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,181Updated 11 months ago
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆444Updated 7 months ago
- ☆836Updated this week
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,037Updated 2 years ago