exe2powershell - exe2bat reborn for modern Windows
☆175Oct 15, 2020Updated 5 years ago
Alternatives and similar repositories for exe2powershell
Users that are interested in exe2powershell are comparing it to the libraries listed below
Sorting:
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- A collection of C# tools for various purposes (kerberoasting, tickets, mimikatz, privesc, domain enumeration and more)☆80Aug 12, 2019Updated 6 years ago
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 4 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- A quick tool for hiding a new process running shellcode.☆57Jun 10, 2020Updated 5 years ago
- A tool to create obfuscated HTA script.☆178Jul 2, 2021Updated 4 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- AggressorScript-UploadAndRunFrp/上传frpc并且运行frpc☆63Sep 1, 2019Updated 6 years ago
- shellcode注入测试工具☆52Aug 5, 2019Updated 6 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- ☆18Sep 6, 2018Updated 7 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆267Dec 19, 2019Updated 6 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- Web ExternalC2 Demo☆52Aug 18, 2020Updated 5 years ago
- Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())☆102Sep 28, 2018Updated 7 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- init☆14Mar 16, 2020Updated 5 years ago
- POC for NetworkService PrivEsc☆130May 4, 2020Updated 5 years ago
- CVE-2019-0604☆133Mar 22, 2019Updated 6 years ago
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆331Oct 20, 2019Updated 6 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆83Sep 27, 2018Updated 7 years ago
- Allow a Go process to dynamically load .NET assemblies☆150Mar 28, 2020Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- cobaltstrike xor64.bin补完计划☆135Oct 14, 2018Updated 7 years ago
- External C2 Using IE COM Objects☆101Feb 24, 2019Updated 7 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆808Aug 28, 2022Updated 3 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Just pick out the code we need.☆65Nov 22, 2019Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago