t3l3machus / PowerShell-Obfuscation-BibleLinks
A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository are the result of personal research, including reading materials online and conducting trial-and-error attempts in labs and pentests.
☆1,027Updated 11 months ago
Alternatives and similar repositories for PowerShell-Obfuscation-Bible
Users that are interested in PowerShell-Obfuscation-Bible are comparing it to the libraries listed below
Sorting:
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆790Updated 3 months ago
- Dominate Active Directory with PowerShell.☆1,009Updated 2 weeks ago
- Windows Local Privilege Escalation Cookbook☆1,145Updated 5 months ago
- C2 infrastructure over Microsoft Teams.☆690Updated 6 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆969Updated last month
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆816Updated last year
- Send phishing messages and attachments to Microsoft Teams users☆1,083Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 5 months ago
- EDR Lab for Experimentation Purposes☆1,289Updated last week
- ☆712Updated last year
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆515Updated 11 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆572Updated 9 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,016Updated last week
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆880Updated 4 years ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,240Updated last month
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆674Updated last month
- Simple & Powerful PowerShell Script Obfuscator☆570Updated 2 months ago
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,164Updated 5 months ago
- Red Team Cheatsheet in constant expansion.☆1,209Updated last year
- Dumping DPAPI credz remotely☆1,162Updated 3 months ago
- Script for generating revshells☆473Updated 10 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,022Updated last month
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,684Updated 8 months ago
- ☆774Updated last week
- PowerShell Ransomware Simulator with C2 Server☆486Updated last year
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆437Updated 4 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆425Updated 3 months ago
- Powershell tool to automate Active Directory enumeration.☆1,134Updated last month
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆936Updated 2 weeks ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆983Updated 2 years ago