Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
☆3,912Jan 24, 2024Updated 2 years ago
Alternatives and similar repositories for unicorn
Users that are interested in unicorn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Empire is a PowerShell and Python post-exploitation agent.☆7,837Jan 19, 2020Updated 6 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,513Sep 22, 2024Updated last year
- A swiss army knife for pentesting networks☆9,131Dec 6, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,987Aug 17, 2020Updated 5 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,341Dec 6, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- PowerShell Runspace Post Exploitation Toolkit☆1,550Aug 2, 2019Updated 6 years ago
- Payload Generation Framework☆1,981Aug 21, 2024Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,917Apr 25, 2024Updated 2 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,964Nov 19, 2025Updated 6 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,217Oct 9, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,425Nov 9, 2022Updated 3 years ago
- PowerShell Obfuscator☆4,250Aug 10, 2023Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,480Oct 1, 2025Updated 7 months ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,322Jan 31, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Feb 10, 2021Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,687Jul 18, 2024Updated last year
- Six Degrees of Domain Admin☆10,532Mar 2, 2026Updated 2 months ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,236Aug 7, 2025Updated 9 months ago
- A tool to abuse Exchange services☆2,304Jun 10, 2024Updated last year
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆528Apr 13, 2017Updated 9 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,108Nov 3, 2017Updated 8 years ago
- My musings with PowerShell☆2,716Nov 19, 2021Updated 4 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,016Jul 3, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,976Mar 22, 2024Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,866Jun 15, 2020Updated 5 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,617Jan 23, 2024Updated 2 years ago
- Run PowerShell command without invoking powershell.exe☆1,550Apr 9, 2026Updated last month
- Run PowerShell with rundll32. Bypass software restrictions.☆1,827Mar 17, 2021Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,575Jan 10, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆15,742Updated this week
- AntiVirus Evasion Tool☆1,752Apr 23, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- SharpSploit is a .NET post-exploitation library written in C#☆1,871Aug 12, 2021Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,828May 5, 2026Updated 2 weeks ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,200May 11, 2023Updated 3 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,531Jun 30, 2023Updated 2 years ago
- Trying to tame the three-headed dog.☆5,007Nov 14, 2025Updated 6 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,458Updated this week
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆2,715Dec 12, 2024Updated last year