Skip to content
View Powershell-coder's full-sized avatar
Block or Report

Block or report Powershell-coder

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol

C# 254 44 Updated Dec 27, 2022

Tunneling Internet traffic over Whatsapp

JavaScript 2,079 96 Updated Nov 27, 2022

MITM server for WebSocket protocol via DNS poisoning

C# 5 2 Updated Oct 4, 2023

Spartacus DLL/COM Hijacking Toolkit

C# 963 129 Updated Feb 1, 2024

A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.

C++ 293 35 Updated Oct 26, 2022

Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)

C++ 246 47 Updated Sep 15, 2022

Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows machines. Official Twitter/X account @PersistSniper. Made w…

PowerShell 1,832 180 Updated Jul 9, 2024

Replace the .txt section of the current loaded modules from \KnownDlls\ to bypass edrs

C 281 38 Updated Sep 28, 2022

.NET assembly local/remote loading/injection into memory.

C# 125 41 Updated Aug 2, 2019

Running .NET from VBA

VBA 129 22 Updated Feb 11, 2023

A C# port of the MinHook API hooking library

C# 50 9 Updated Oct 5, 2022

Detecting Windows x86 API hooking and modification for analysis purposes

C++ 21 5 Updated Oct 5, 2022
C++ 97 24 Updated Aug 7, 2022

A basic emulation of an "RPC Backdoor"

C 206 45 Updated Aug 25, 2022

Adversary Emulation Framework

Go 7,934 1,049 Updated Jul 9, 2024

Sandman is a NTP based backdoor for red team engagements in hardened networks.

C# 694 97 Updated Mar 31, 2024

Active Directory delegation management tool

Rust 272 32 Updated Jun 7, 2023

Chrome Keylogger Extension | Post Exploitation Tool

Python 378 103 Updated Apr 26, 2022

InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assembly execution as an alternative to Cobalt Strikes traditiona…

C 563 113 Updated Jul 22, 2023

LoadLibrary for offensive operations

C 1,034 204 Updated Oct 22, 2021

Exploiting: CVE-2021-41349

Python 9 6 Updated Jan 6, 2022

HardeningKitty and Windows Hardening Settings

PowerShell 2,259 303 Updated Jun 23, 2024

Run Powershell without software restrictions.

C# 278 46 Updated Sep 8, 2021

A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.

Python 475 58 Updated Mar 16, 2024

PoC Windows Usermode Rootkit made in C# and C++, made to show you how to protect your process using hooking.

C# 65 15 Updated Oct 24, 2023

A tool to make socks connections through HTTP agents

Python 655 112 Updated Mar 30, 2021

GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive.

Go 495 101 Updated Apr 1, 2024
Next