trustedsec / unicornLinks
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
☆3,874Updated last year
Alternatives and similar repositories for unicorn
Users that are interested in unicorn are comparing it to the libraries listed below
Sorting:
- Veil 3.1.X (Check version info in Veil at runtime)☆4,156Updated 2 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,715Updated 5 years ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,583Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,772Updated 5 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,396Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,132Updated 2 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,840Updated 4 years ago
- PowerShell Obfuscator☆4,098Updated 2 years ago
- A swiss army knife for pentesting networks☆8,943Updated last year
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,413Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,873Updated last month
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,536Updated last year
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,280Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,082Updated 2 months ago
- PowerTools is a collection of PowerShell projects with a focus on offensive operations.☆2,149Updated 3 years ago
- AntiVirus Evasion Tool☆1,723Updated 6 months ago
- Mimikatz implementation in pure Python☆3,154Updated last month
- Wiki to collect Red Team infrastructure hardening resources☆4,369Updated 3 weeks ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,129Updated 2 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,517Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,271Updated 2 months ago
- Undetectable Windows Payload Generation☆1,605Updated 2 years ago
- SMBMap is a handy SMB enumeration tool☆1,963Updated 7 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,659Updated 5 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,060Updated 3 weeks ago
- Unified repository for different Metasploit Framework payloads☆1,901Updated 2 weeks ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,751Updated last week
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,436Updated 2 years ago
- ☆3,722Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,764Updated 2 weeks ago