trustedsec / unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
☆3,736Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for unicorn
- Empire is a PowerShell and Python post-exploitation agent.☆7,461Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,008Updated last year
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆3,971Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,449Updated last month
- A swiss army knife for pentesting networks☆8,457Updated 11 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆8,804Updated 6 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,261Updated last week
- PowerShell Obfuscator☆3,746Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,525Updated 4 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,167Updated last month
- AntiVirus Evasion Tool☆1,651Updated last year
- The ultimate WinRM shell for hacking/pentesting☆4,542Updated 3 weeks ago
- Mimikatz implementation in pure Python☆2,879Updated last month
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,312Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,201Updated 4 months ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,197Updated 11 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,472Updated last month
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆2,934Updated 3 months ago
- Windows Exploit Suggester - Next Generation☆4,230Updated this week
- PowerSploit - A PowerShell Post-Exploitation Framework☆11,928Updated 4 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,825Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,014Updated last month
- Wiki to collect Red Team infrastructure hardening resources☆4,152Updated 7 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,613Updated this week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆6,967Updated last month
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,444Updated last month
- Six Degrees of Domain Admin☆9,909Updated 4 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,337Updated 9 months ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,579Updated last month