0x727 / SchTask_0x727
创建隐藏计划任务,权限维持,Bypass AV
☆526Updated 3 years ago
Alternatives and similar repositories for SchTask_0x727:
Users that are interested in SchTask_0x727 are comparing it to the libraries listed below
- 使用多种WinAPI进行权限维持的CobaltStrike脚本,包含API设置系统服务,设置计划任务,管理用户等。☆537Updated 3 years ago
- 远程shellcode加载&权限维持+小功能☆294Updated 8 months ago
- dump lsass进程工具☆549Updated last year
- 重构了Cobaltstrike Beacon,行为对国内主流杀软免杀,支持4.1以上的版本。 A cobaltstrike Beacon bypass anti-virus, supports 4.1+ version.☆278Updated 2 years ago
- Syscall免杀☆506Updated 6 months ago
- 从零开始学免杀☆432Updated 2 years ago
- 基于 OPSEC 的 CobaltStrike 后渗透自动化链☆415Updated 10 months ago
- 自己开的cs插件☆242Updated last year
- 内网渗透|红队工具|C#内存加载|cobaltstrike☆296Updated 2 years ago
- Some demos to bypass EDRs or AVs by 78itsT3@m☆349Updated 2 years ago
- cs4.4修改去特征狗狗版(美化ui,去除特征,自带bypass核晶截图等..)☆573Updated 2 years ago
- Bypass_AV msf免杀,ShellCode免杀加载器 ,免杀shellcode执行程序 ,360&火绒&Windows Defender☆224Updated 2 years ago
- 将dll exe 等转成shellcode 最后输出exe 可定制加载器模板 支持白文件的捆绑 shellcode 加密☆365Updated 2 years ago
- 风暴免杀-bypass defender、360、vt☆188Updated last year
- 一款可以过国内所有杀软可以过云查杀的shellcode loader☆145Updated 2 years ago
- EDR绕过demo☆287Updated last year
- 域信息收集工具☆388Updated 2 years ago
- python写的一款免杀工具(shellcode加载器)BypassAV,国内杀软全过(windows denfend)2021-9-13☆269Updated 2 months ago
- 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化☆332Updated 2 years ago
- Redis-Attack By Replication (通过主从复制攻击Redis)☆324Updated 2 years ago
- 红队行动中利用白利用、免杀、自动判断网络环境生成钓鱼可执行文件。☆363Updated 6 months ago
- EXE转ShellCode工具☆187Updated 2 years ago
- 免杀某60、火绒、pythonShellcode-loader☆55Updated last year
- 域内自动化信息搜集利用工具☆416Updated last year
- 免杀shellcode加载器☆450Updated 3 years ago