Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
☆3,902Jan 24, 2024Updated 2 years ago
Alternatives and similar repositories for unicorn
Users that are interested in unicorn are comparing it to the libraries listed below
Sorting:
- Empire is a PowerShell and Python post-exploitation agent.☆7,828Jan 19, 2020Updated 6 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,498Sep 22, 2024Updated last year
- A swiss army knife for pentesting networks☆9,100Dec 6, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,912Aug 17, 2020Updated 5 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,329Dec 6, 2023Updated 2 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- Payload Generation Framework☆1,976Aug 21, 2024Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,802Apr 25, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,924Nov 19, 2025Updated 4 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,211Oct 9, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,421Nov 9, 2022Updated 3 years ago
- PowerShell Obfuscator☆4,218Aug 10, 2023Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,458Oct 1, 2025Updated 5 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,641Jul 18, 2024Updated last year
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,310Jan 31, 2022Updated 4 years ago
- Six Degrees of Domain Admin☆10,558Mar 2, 2026Updated 2 weeks ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,218Aug 7, 2025Updated 7 months ago
- A tool to abuse Exchange services☆2,302Jun 10, 2024Updated last year
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Apr 13, 2017Updated 8 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- My musings with PowerShell☆2,707Nov 19, 2021Updated 4 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,014Jul 3, 2018Updated 7 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,948Mar 22, 2024Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,846Jun 15, 2020Updated 5 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,622Jan 23, 2024Updated 2 years ago
- Run PowerShell command without invoking powershell.exe☆1,536Mar 23, 2023Updated 2 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,821Mar 17, 2021Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,504Jan 10, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- SharpSploit is a .NET post-exploitation library written in C#☆1,862Aug 12, 2021Updated 4 years ago
- AntiVirus Evasion Tool☆1,747Apr 23, 2025Updated 10 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,810Mar 14, 2026Updated last week
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,179May 11, 2023Updated 2 years ago
- Trying to tame the three-headed dog.☆4,920Nov 14, 2025Updated 4 months ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,529Jun 30, 2023Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,383Jan 26, 2026Updated last month
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆2,696Dec 12, 2024Updated last year