Powershell-coder

Powershell-coder

User data from Github https://github.com/Powershell-coder

Location:.net land

GitHub:@Powershell-coder

Powershell-coder's starred repositories

sliver

Adversary Emulation Framework

Language:GoLicense:GPL-3.0Stargazers:10202Issues:154Issues:837

wa-tunnel

Tunneling Internet traffic over Whatsapp

Language:JavaScriptLicense:MITStargazers:2921Issues:22Issues:19

windows_hardening

HardeningKitty and Windows Hardening Settings

Language:PowerShellLicense:MITStargazers:2549Issues:78Issues:72

PersistenceSniper

Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made with ❤️ by @last0x00 and @dottor_morte

Language:PowerShellLicense:NOASSERTIONStargazers:2037Issues:42Issues:16

maldev-for-dummies

A workshop about Malware Development

Language:NimLicense:NOASSERTIONStargazers:1723Issues:27Issues:2

DarkLoadLibrary

LoadLibrary for offensive operations

Spartacus

Spartacus DLL/COM Hijacking Toolkit

Language:C#License:MITStargazers:1066Issues:22Issues:5

Sandman

Sandman is a NTP based backdoor for hardened networks.

Language:C#License:GPL-3.0Stargazers:810Issues:13Issues:2

pivotnacci

A tool to make socks connections through HTTP agents

Language:PythonLicense:AGPL-3.0Stargazers:716Issues:19Issues:7

InlineExecute-Assembly

InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditional fork and run execute-assembly module

GC2-sheet

GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft SharePoint List and exfiltrate files using Google Drive or Microsoft SharePoint Document.

Language:GoLicense:GPL-3.0Stargazers:632Issues:14Issues:14

windows-coerced-authentication-methods

A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.

HeraKeylogger

Chrome Keylogger Extension | Post Exploitation Tool

Language:PythonLicense:BSD-3-ClauseStargazers:430Issues:24Issues:6

adeleg

Active Directory delegation management tool

KnownDllUnhook

Replace the .txt section of the current loaded modules from \KnownDlls\

Language:CLicense:MITStargazers:302Issues:7Issues:0

DragonCastle

A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.

Language:C++Stargazers:300Issues:6Issues:0

PowerShx

Run Powershell without software restrictions.

Language:C#License:MITStargazers:283Issues:8Issues:1

SharpGmailC2

Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol

Language:C#License:MITStargazers:266Issues:10Issues:2

CdpSvcLPE

Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)

RPC-Backdoor

A basic emulation of an "RPC Backdoor"

Language:CLicense:MITStargazers:243Issues:4Issues:0

vba2clr

Running .NET from VBA

Language:VBAStargazers:147Issues:3Issues:0

NET-Assembly-Inject-Remote

.NET assembly local/remote loading/injection into memory.

Language:C#Stargazers:135Issues:8Issues:0
Language:C++License:MITStargazers:114Issues:4Issues:0

MinHook.NET

A C# port of the MinHook API hooking library

Language:C#License:BSD-3-ClauseStargazers:56Issues:1Issues:0

api-monitor32

A simple tool for detecting memory modifications to Windows API.

Language:C++License:MITStargazers:22Issues:2Issues:0

CVE-2021-41349

Exploiting: CVE-2021-41349

Language:PythonStargazers:11Issues:1Issues:0

WebSocketMITM

MITM server for WebSocket protocol via DNS poisoning

Language:C#Stargazers:4Issues:1Issues:0