{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"PowerRemoteDesktop","owner":"PhrozenIO","isFork":false,"description":"Remote Desktop entirely coded in PowerShell.","topicNames":["windows","remote-control","powershell","remote","desktop","windows-10","rdp","windows-11"],"topicsNotShown":0,"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":1,"issueCount":9,"starsCount":2083,"forksCount":252,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-10T18:05:54.084Z"}},{"type":"Public","name":"Snippets","owner":"PhrozenIO","isFork":false,"description":"Repository that will progressively hold tiny projects and code snippets.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Pascal","color":"#E3F171"},"pullRequestCount":0,"issueCount":0,"starsCount":10,"forksCount":3,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-21T14:14:32.390Z"}},{"type":"Public","name":"PowerBruteLogon","owner":"PhrozenIO","isFork":false,"description":"PowerBruteLogon (Ported version of WinBruteLogon in pure PowerShell)","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":2,"starsCount":115,"forksCount":21,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-09T10:38:29.408Z"}},{"type":"Public","name":"win-brute-logon","owner":"PhrozenIO","isFork":false,"description":"Crack any Microsoft Windows users password without any privilege (Guest account included)","topicNames":["windows","delphi","pascal","bruteforce"],"topicsNotShown":0,"primaryLanguage":{"name":"Pascal","color":"#E3F171"},"pullRequestCount":0,"issueCount":1,"starsCount":1063,"forksCount":181,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-09T10:37:58.140Z"}},{"type":"Public","name":"DLest","owner":"PhrozenIO","isFork":false,"description":"","topicNames":["microsoft","windows","export","delphi","dll","infosec","malware-analysis","portable-executable"],"topicsNotShown":0,"primaryLanguage":{"name":"Pascal","color":"#E3F171"},"pullRequestCount":0,"issueCount":0,"starsCount":129,"forksCount":26,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-09T10:37:43.839Z"}},{"type":"Public","name":"SharpFtpC2","owner":"PhrozenIO","isFork":false,"description":"A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.","topicNames":["microsoft","windows","csharp","ftp","infosec","ftp-client","c2","redteam","adversary-simulation"],"topicsNotShown":0,"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":82,"forksCount":15,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-09T10:37:20.460Z"}},{"type":"Public","name":"SharpShellPipe","owner":"PhrozenIO","isFork":false,"description":"This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol. ","topicNames":["shell","remote-control","csharp","smb","infosec","remote-shell","offensive-security","redteam","namedpipe","adversary-simulation"],"topicsNotShown":1,"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":109,"forksCount":14,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-09T10:36:23.156Z"}},{"type":"Public","name":".github","owner":"PhrozenIO","isFork":false,"description":"Organisation Home Page","topicNames":[],"topicsNotShown":0,"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-09T10:35:14.079Z"}},{"type":"Public","name":"run-as-attached-networked","owner":"PhrozenIO","isFork":false,"description":"RunAsAttached is a program to run a console as another user and keep new console attached to caller console. Support reverse shell mode (Ex: Netcat)","topicNames":["delphi","pascal","remote-access","runas","runasadmin","penetration-testing"],"topicsNotShown":0,"primaryLanguage":{"name":"Pascal","color":"#E3F171"},"pullRequestCount":0,"issueCount":0,"starsCount":75,"forksCount":17,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-25T16:43:47.495Z"}},{"type":"Public","name":"PsyloDbg","owner":"PhrozenIO","isFork":false,"description":"User-friendly Microsoft Windows Debugger for Malware Analysts.","topicNames":["windows","debugger","delphi","pascal","winapi","dbg"],"topicsNotShown":0,"primaryLanguage":{"name":"Pascal","color":"#E3F171"},"pullRequestCount":0,"issueCount":2,"starsCount":188,"forksCount":27,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-15T14:15:40.450Z"}},{"type":"Public","name":"PowerRunAsSystem","owner":"PhrozenIO","isFork":false,"description":"Run application as system with interactive system process support (active Windows session)","topicNames":["system","interactive","process","nt","windows","powershell"],"topicsNotShown":0,"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":216,"forksCount":26,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-02-25T15:04:09.904Z"}},{"type":"Public","name":"PowerRunAsAttached","owner":"PhrozenIO","isFork":false,"description":"This script allows to spawn a new interactive console as another user account in the same calling console (console instance/window).","topicNames":["runas","runasadmin","runas-command","powershell","powershell-module"],"topicsNotShown":0,"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":87,"forksCount":17,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-27T15:46:16.240Z"}},{"type":"Public","name":"RunAsAttached","owner":"PhrozenIO","isFork":false,"description":"RunAsAttached is a program to locally run a new terminal as another user without spawning a new console window.","topicNames":["delphi","pascal","runas","runasadmin","runas-command"],"topicsNotShown":0,"primaryLanguage":{"name":"Pascal","color":"#E3F171"},"pullRequestCount":0,"issueCount":0,"starsCount":44,"forksCount":11,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-27T14:37:22.535Z"}},{"type":"Public","name":"PowerAssembly","owner":"PhrozenIO","isFork":false,"description":"Map remote .NET assemblies to memory for further invocation.","topicNames":["assembly","loader","remote","powershell"],"topicsNotShown":0,"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":38,"forksCount":9,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-10-22T16:24:38.552Z"}}],"repositoryCount":14,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"mirror","text":"Mirrors"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}