0x727 / SchTask_0x727
创建隐藏计划任务,权限维持,Bypass AV
☆532Updated 3 years ago
Alternatives and similar repositories for SchTask_0x727:
Users that are interested in SchTask_0x727 are comparing it to the libraries listed below
- 使用多种WinAPI进行权限维持的CobaltStrike脚本,包含API设置系统服务,设置计划任务,管理用户等。☆540Updated 3 years ago
- 远程shellcode加载&权限维持+小功能☆295Updated 11 months ago
- Bypass_AV msf免杀,ShellCode免杀加载器 ,免杀shellcode执行程序 ,360&火绒&Windows Defender☆224Updated 2 years ago
- 重构了Cobaltstrike Beacon,行为对国内主流杀软免杀,支持4.1以上的版本。 A cobaltstrike Beacon bypass anti-virus, supports 4.1+ version.☆300Updated 2 years ago
- Syscall免杀☆508Updated 10 months ago
- 自己开的cs插件☆243Updated 2 years ago
- 将dll exe 等转成shellcode 最后输出exe 可定制加载器模板 支持白文件的捆绑 shellcode 加密☆362Updated 2 years ago
- 内网渗透|红队工具|C#内存加载|cobaltstrike☆294Updated 2 years ago
- dump lsass进程工具☆549Updated last year
- cs4.4修改去特征狗狗版(美化ui,去除特征,自带bypass核晶截图等..)☆571Updated 2 years ago
- 从零开始学免杀☆433Updated 3 years ago
- Some demos to bypass EDRs or AVs by 78itsT3@m☆351Updated 2 years ago
- Redis-Attack By Replication (通过主从复制攻击Redis)☆331Updated 2 years ago
- 风暴免杀-bypass defender、360、vt☆194Updated last year
- 域信息收集工具☆393Updated 2 years ago
- 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化☆333Updated 3 years ago
- 基于 OPSEC 的 CobaltStrike 后渗透自动化链☆430Updated last year
- Burp插件,Malleable C2 Profiles生成器;可以通过Burp代理选中请求,生成Cobalt Strike的profile文件(CSprofile)☆276Updated 3 years ago
- This is my FirstRepository☆321Updated last year
- python写的一款免杀工具(shellcode加载器)BypassAV,国内杀软全过(windows denfend)2021-9-13☆273Updated 5 months ago
- 免杀shellcode加载器☆456Updated 3 years ago
- asp.net内存马检测工具☆270Updated last year
- useful-code☆180Updated last year
- 适用于Cobalt Strike的插件☆549Updated 3 years ago
- EXE转ShellCode工具☆201Updated 2 years ago
- 一款可以在不出网的环境下进行反向代理及cs上线的工具☆486Updated 2 years ago
- 域内自动化信息搜集利用工具☆421Updated last year
- 数据库综合利用工具☆542Updated 3 years ago
- 检测域环境内,域机器的本地管理组成员是否存在弱口令和通用口令,对域用户的权限分配以及域内委派查询☆339Updated 3 years ago
- 红队行动中利用白利用、免杀、自动判断网络环境生成钓鱼可执行文件。☆362Updated 10 months ago