t3l3machus / PowerShell-Obfuscation-BibleLinks
A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository are the result of personal research, including reading materials online and conducting trial-and-error attempts in labs and pentests.
☆1,009Updated 10 months ago
Alternatives and similar repositories for PowerShell-Obfuscation-Bible
Users that are interested in PowerShell-Obfuscation-Bible are comparing it to the libraries listed below
Sorting:
- Windows Local Privilege Escalation Cookbook☆1,122Updated 4 months ago
- Dominate Active Directory with PowerShell. Inspired by CrackMapExec / NetExec.☆975Updated 2 weeks ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆753Updated 2 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆568Updated 7 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆516Updated 9 months ago
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,264Updated last month
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,968Updated 3 weeks ago
- Simple & Powerful PowerShell Script Obfuscator☆563Updated 3 weeks ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 4 months ago
- Powershell tool to automate Active Directory enumeration.☆1,108Updated 2 months ago
- ☆712Updated last year
- Dumping DPAPI credz remotely☆1,127Updated 2 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆421Updated 2 months ago
- PowerShell Ransomware Simulator with C2 Server☆486Updated last year
- Send phishing messages and attachments to Microsoft Teams users☆1,081Updated 11 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆889Updated last week
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,114Updated 4 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,196Updated 4 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,977Updated 2 months ago
- A light-weight first-stage C2 implant written in Nim (and Rust).☆885Updated 2 months ago
- BloodyAD is an Active Directory Privilege Escalation Framework☆1,689Updated last week
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆856Updated 4 years ago
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆434Updated 3 months ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆810Updated 11 months ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,150Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,670Updated 7 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆664Updated 2 weeks ago
- The Hunt for Malicious Strings☆1,224Updated 3 weeks ago
- Script for generating revshells☆470Updated 8 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆658Updated last month