AES-PowerShellCode
Malware payload
A PowerShell payload designed to evade detection and execute malicious commands on a target system
Standalone version of my AES Powershell payload for Cobalt Strike.
108 stars
2 watching
12 forks
Language: PowerShell
last commit: about 5 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| Scripts designed to be used as payloads in Cobalt Strike attacks | 148 |
| Loads and executes a malicious payload in a Windows system using PowerShell. | 245 |
| A tool designed to evade antivirus detection and deliver payloads | 836 |
| A tool for generating malware payloads using MSBuild and PowerShell, allowing for conditional execution based on user domain or registry conditions. | 1,480 |
| A tool to generate deserialization payloads for exploiting vulnerabilities in various frameworks | 105 |
| A low-level shellcode loader that defeats modern EDR systems by utilizing various evasion techniques and encryption. | 891 |
| A collection of JavaScript files designed to exploit vulnerabilities in popular CMS platforms | 1,346 |
| An aggressor script that allows Cobalt Strike to perform process injection and persistence by leveraging direct syscalls to bypass EDR/AV systems. | 229 |
| Automates payload development and deployment using Python classes to interact with Cobalt Strike and other tools | 118 |
| A tool that enables secure encryption and decryption of HTTP payloads using AES encryption. | 25 |
| A collection of PowerShell scripts for creating and executing malware payloads | 443 |
| An offensive information and vulnerability scanner that identifies potential security issues in web applications | 2,238 |
| A collection of payloads designed to exploit vulnerabilities in large language models. | 70 |
| A collection of PowerShell scripts used to test and exploit the security of Windows systems. | 144 |
| A tool designed to bypass antivirus software by generating and executing malicious shellcode | 17 |