t3l3machus / PowerShell-Obfuscation-BibleLinks
A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository are the result of personal research, including reading materials online and conducting trial-and-error attempts in labs and pentests.
☆1,116Updated last year
Alternatives and similar repositories for PowerShell-Obfuscation-Bible
Users that are interested in PowerShell-Obfuscation-Bible are comparing it to the libraries listed below
Sorting:
- Dominate Active Directory with PowerShell.☆1,131Updated last week
- Windows Local Privilege Escalation Cookbook☆1,217Updated 10 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆808Updated 8 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,235Updated 3 weeks ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,357Updated last month
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆831Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆742Updated last month
- EDR Lab for Experimentation Purposes☆1,387Updated last month
- C2 infrastructure over Microsoft Teams.☆730Updated 10 months ago
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆466Updated 9 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,784Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,116Updated 2 weeks ago
- Red Team Cheatsheet in constant expansion.☆1,249Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,136Updated 3 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆511Updated last year
- ☆714Updated last year
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆923Updated 4 years ago
- Dumping DPAPI credz remotely☆1,282Updated 8 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆599Updated 4 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆726Updated 6 months ago
- Send phishing messages and attachments to Microsoft Teams users☆1,096Updated last year
- Powershell tool to automate Active Directory enumeration.☆1,255Updated 3 months ago
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,173Updated 10 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆772Updated 2 weeks ago
- Simple & Powerful PowerShell Script Obfuscator☆588Updated 6 months ago
- ☆828Updated last month
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆428Updated 2 months ago
- PowerShell Ransomware Simulator with C2 Server☆493Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,196Updated 2 years ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,017Updated this week