trustedsec / unicornLinks
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
☆3,834Updated last year
Alternatives and similar repositories for unicorn
Users that are interested in unicorn are comparing it to the libraries listed below
Sorting:
- Veil 3.1.X (Check version info in Veil at runtime)☆4,106Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,618Updated 5 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,676Updated 4 years ago
- A swiss army knife for pentesting networks☆8,732Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,067Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,825Updated last week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,215Updated last year
- PowerShell Obfuscator☆3,989Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,542Updated 7 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,407Updated 10 months ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,309Updated 8 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,850Updated 5 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,595Updated this week
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,380Updated last year
- Veil Evasion is no longer supported, use Veil 3.0!☆1,835Updated 3 years ago
- Windows Exploit Suggester - Next Generation☆4,438Updated last week
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,255Updated last year
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,071Updated 9 months ago
- Mimikatz implementation in pure Python☆3,026Updated last week
- Wiki to collect Red Team infrastructure hardening resources☆4,272Updated last year
- A collaborative, multi-platform, red teaming framework☆3,685Updated last week
- Undetectable Windows Payload Generation☆1,598Updated 2 years ago
- AntiVirus Evasion Tool☆1,702Updated last month
- SMBMap is a handy SMB enumeration tool☆1,904Updated 3 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,344Updated 4 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,113Updated last week
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,706Updated last year
- ☆3,593Updated last year
- Unified repository for different Metasploit Framework payloads☆1,842Updated last week
- Six Degrees of Domain Admin☆10,187Updated 2 weeks ago