trustedsec / unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
☆3,795Updated last year
Alternatives and similar repositories for unicorn:
Users that are interested in unicorn are comparing it to the libraries listed below
- Veil 3.1.X (Check version info in Veil at runtime)☆4,055Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,555Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,035Updated last year
- A swiss army knife for pentesting networks☆8,608Updated last year
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,022Updated 10 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,488Updated 4 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,614Updated 4 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,398Updated last month
- PowerShell Obfuscator☆3,873Updated last year
- The ultimate WinRM shell for hacking/pentesting☆4,736Updated 3 months ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,227Updated 5 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,680Updated last month
- Wiki to collect Red Team infrastructure hardening resources☆4,224Updated 10 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,310Updated 7 months ago
- Mimikatz implementation in pure Python☆2,962Updated this week
- Veil Evasion is no longer supported, use Veil 3.0!☆1,833Updated 3 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,230Updated last year
- Windows Exploit Suggester - Next Generation☆4,339Updated this week
- SMBMap is a handy SMB enumeration tool☆1,850Updated this week
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,017Updated 6 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,075Updated last month
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,344Updated last year
- AntiVirus Evasion Tool☆1,682Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,157Updated 4 years ago
- Undetectable Windows Payload Generation☆1,578Updated 2 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,429Updated 3 months ago
- Six Degrees of Domain Admin☆10,072Updated 2 weeks ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,503Updated 3 weeks ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,809Updated 6 months ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,510Updated 3 years ago