yanncam / exe2powershellLinks
exe2powershell - exe2bat reborn for modern Windows
☆175Updated 5 years ago
Alternatives and similar repositories for exe2powershell
Users that are interested in exe2powershell are comparing it to the libraries listed below
Sorting:
- I created the python script to bypass UAC to get system shell .☆121Updated 6 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆267Updated 6 years ago
- Binaries, PowerShell scripts and information about Digital Signature Hijacking.☆227Updated 8 years ago
- Miscellaneous projects related to attacking Windows.☆197Updated 11 years ago
- Enumerate and decrypt TeamViewer credentials from Windows registry☆242Updated 4 years ago
- The great CrackMapExec tool compiled for Windows☆265Updated 10 years ago
- SharpClipHistory is a .NET application written in C# that can be used to read the contents of a user's clipboard history in Windows 10 st…☆200Updated 6 years ago
- Example DLL to load from Windows NetShell☆182Updated 9 years ago
- Cobalt Strike Aggressor Scripts☆143Updated last year
- The VBScript Obfuscator written in VBScript☆117Updated 4 years ago
- Steal privileged token to obtain SYSTEM shell☆252Updated 5 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆176Updated 5 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Updated 7 years ago
- CoffeeShot: Avoid Detection with Memory Injection☆77Updated 7 years ago
- Cobalt Strike aggressor scripts☆90Updated 7 years ago
- Windows UAC Bypass☆99Updated 6 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆113Updated 2 years ago
- ☆187Updated 4 years ago
- Dump TeamViewer ID and password from memory. Works much better than other tools.☆100Updated 7 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆290Updated 8 years ago
- NTDS.dit offline dumper with non-elevated☆221Updated 8 years ago
- initial commit☆174Updated 7 years ago
- Use CLR to inject all the .NET apps☆183Updated 4 years ago
- SMBExec C# module☆218Updated 5 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 11 months ago
- Various Aggressor Scripts I've Created.☆151Updated 4 years ago
- Collection of Aggressor Scripts for Cobalt Strike☆172Updated 7 years ago
- Exports Kerberos KrbCred Tickets for use in Mimikatz/Beacon from a Kerberos CCache File☆89Updated 10 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆60Updated 8 years ago
- Extracts cookies from Chrome.☆204Updated 2 years ago