Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
☆3,907Jan 24, 2024Updated 2 years ago
Alternatives and similar repositories for unicorn
Users that are interested in unicorn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Empire is a PowerShell and Python post-exploitation agent.☆7,836Jan 19, 2020Updated 6 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,499Sep 22, 2024Updated last year
- A swiss army knife for pentesting networks☆9,117Dec 6, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,939Aug 17, 2020Updated 5 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,335Dec 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PowerShell Runspace Post Exploitation Toolkit☆1,549Aug 2, 2019Updated 6 years ago
- Payload Generation Framework☆1,982Aug 21, 2024Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,830Apr 25, 2024Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,937Nov 19, 2025Updated 4 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,213Oct 9, 2023Updated 2 years ago
- HTA encryption tool for RedTeams☆1,423Nov 9, 2022Updated 3 years ago
- PowerShell Obfuscator☆4,233Aug 10, 2023Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,467Oct 1, 2025Updated 6 months ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,315Jan 31, 2022Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,656Jul 18, 2024Updated last year
- Six Degrees of Domain Admin☆10,534Mar 2, 2026Updated last month
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,217Aug 7, 2025Updated 8 months ago
- A tool to abuse Exchange services☆2,303Jun 10, 2024Updated last year
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Apr 13, 2017Updated 8 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- My musings with PowerShell☆2,712Nov 19, 2021Updated 4 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,017Jul 3, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,960Mar 22, 2024Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,854Jun 15, 2020Updated 5 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,621Jan 23, 2024Updated 2 years ago
- Run PowerShell command without invoking powershell.exe☆1,541Mar 23, 2023Updated 3 years ago
- Run PowerShell with rundll32. Bypass software restrictions.☆1,821Mar 17, 2021Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,538Jan 10, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆15,608Updated this week
- SharpSploit is a .NET post-exploitation library written in C#☆1,865Aug 12, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- AntiVirus Evasion Tool☆1,750Apr 23, 2025Updated 11 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,815Mar 20, 2026Updated 3 weeks ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,188May 11, 2023Updated 2 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,528Jun 30, 2023Updated 2 years ago
- Trying to tame the three-headed dog.☆4,952Nov 14, 2025Updated 4 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,413Jan 26, 2026Updated 2 months ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆2,702Dec 12, 2024Updated last year