Powershell-coder's starred repositories
windows_hardening
HardeningKitty and Windows Hardening Settings
PersistenceSniper
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte
maldev-for-dummies
A workshop about Malware Development
DarkLoadLibrary
LoadLibrary for offensive operations
pivotnacci
A tool to make socks connections through HTTP agents
InlineExecute-Assembly
InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module
windows-coerced-authentication-methods
A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.
HeraKeylogger
Chrome Keylogger Extension | Post Exploitation Tool
KnownDllUnhook
Replace the .txt section of the current loaded modules from \KnownDlls\
DragonCastle
A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.
SharpGmailC2
Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol
RPC-Backdoor
A basic emulation of an "RPC Backdoor"
NET-Assembly-Inject-Remote
.NET assembly local/remote loading/injection into memory.
MinHook.NET
A C# port of the MinHook API hooking library
api-monitor32
A simple tool for detecting memory modifications to Windows API.
CVE-2021-41349
Exploiting: CVE-2021-41349
WebSocketMITM
MITM server for WebSocket protocol via DNS poisoning