yanncam / exe2powershell
exe2powershell - exe2bat reborn for modern Windows
☆172Updated 4 years ago
Alternatives and similar repositories for exe2powershell:
Users that are interested in exe2powershell are comparing it to the libraries listed below
- I created the python script to bypass UAC to get system shell .☆122Updated 5 years ago
- Example DLL to load from Windows NetShell☆179Updated 8 years ago
- The great CrackMapExec tool compiled for Windows☆260Updated 9 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆263Updated 5 years ago
- Windows UAC Bypass☆97Updated 5 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆174Updated 4 years ago
- Programmatically create an administrative user under Windows☆180Updated 8 years ago
- Miscellaneous projects related to attacking Windows.☆187Updated 10 years ago
- ☆348Updated 3 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆200Updated 6 years ago
- ☆186Updated 3 years ago
- NTDS.dit offline dumper with non-elevated☆217Updated 7 years ago
- The VBScript Obfuscator written in VBScript☆111Updated 3 years ago
- Tool to create hidden registry keys.☆480Updated 5 years ago
- ☆279Updated 4 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆113Updated 8 years ago
- Windows Credentials Editor v1.3beta☆107Updated 5 years ago
- Enumerate and decrypt TeamViewer credentials from Windows registry☆240Updated 3 years ago
- Steal privileged token to obtain SYSTEM shell☆245Updated 4 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆327Updated last year
- Collection of Aggressor Scripts for Cobalt Strike☆169Updated 6 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated last month
- Windows Defender ShellCode Execution Bypass☆128Updated 5 years ago
- Shellcode wrapper with encryption for multiple target languages☆436Updated 8 years ago
- Windows active user credential phishing tool☆280Updated 5 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆244Updated 4 years ago
- Binaries, PowerShell scripts and information about Digital Signature Hijacking.☆215Updated 7 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆256Updated 6 years ago
- Evading Anti-Virus with Unusual Technique☆212Updated 2 years ago
- Create a minidump of the LSASS process from memory☆259Updated 2 years ago