AES-PowerShellCode
Malware payload
A PowerShell payload designed to evade detection and execute malicious commands on a target system
Standalone version of my AES Powershell payload for Cobalt Strike.
108 stars
2 watching
12 forks
Language: PowerShell
last commit: almost 6 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Scripts designed to be used as payloads in Cobalt Strike attacks | 148 |
| | Loads and executes a malicious payload in a Windows system using PowerShell. | 245 |
| | A tool designed to evade antivirus detection and deliver payloads | 836 |
| | A tool for generating malware payloads using MSBuild and PowerShell, allowing for conditional execution based on user domain or registry conditions. | 1,480 |
| | A tool to generate deserialization payloads for exploiting vulnerabilities in various frameworks | 105 |
| | A low-level shellcode loader that defeats modern EDR systems by utilizing various evasion techniques and encryption. | 891 |
| | A collection of JavaScript files designed to exploit vulnerabilities in popular CMS platforms | 1,346 |
| | An aggressor script that allows Cobalt Strike to perform process injection and persistence by leveraging direct syscalls to bypass EDR/AV systems. | 229 |
| | Automates payload development and deployment using Python classes to interact with Cobalt Strike and other tools | 118 |
| | A tool that enables secure encryption and decryption of HTTP payloads using AES encryption. | 25 |
| | A collection of PowerShell scripts for creating and executing malware payloads | 443 |
| | An offensive information and vulnerability scanner that identifies potential security issues in web applications | 2,238 |
| | A collection of payloads designed to exploit vulnerabilities in large language models. | 70 |
| | A collection of PowerShell scripts used to test and exploit the security of Windows systems. | 144 |
| | A tool designed to bypass antivirus software by generating and executing malicious shellcode | 17 |