3gstudent / Homework-of-C-LanguageLinks
C/C++ code examples of my blog.
☆391Updated 3 years ago
Alternatives and similar repositories for Homework-of-C-Language
Users that are interested in Homework-of-C-Language are comparing it to the libraries listed below
Sorting:
- POCs for Shellcode Injection via Callbacks☆411Updated 4 years ago
- X86 version of syswhispers2 / x86 direct system call☆327Updated 4 years ago
- A protective and Low Level Shellcode Loader that defeats modern EDR systems.☆916Updated last year
- Use ICMLuaUtil to Bypass UAC!☆591Updated 5 years ago
- Shellcode wrapper with encryption for multiple target languages☆440Updated 8 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆549Updated 5 years ago
- SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party ap…☆257Updated 4 years ago
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.☆473Updated last year
- DLL Hijacking Detection Tool☆525Updated 6 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆587Updated 4 years ago
- CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能☆727Updated 4 years ago
- DLL and PowerShell script to assist with finding DLL hijacks☆339Updated 5 years ago
- Cobalt Strike Shellcode Generator☆664Updated 9 months ago
- Resources About Anti-Virus and Anti-Anti-Virus, including 200+ tools and 1300+ posts☆455Updated 5 years ago
- CVE-2021-1732 Exploit☆419Updated 4 years ago
- Dump the memory of a PPL with a userland exploit☆880Updated 3 years ago
- PE loader with various shellcode injection techniques☆433Updated 2 years ago
- A tool mainly to erase specified records from Windows event logs, with additional functionalities.☆604Updated 7 years ago
- Collection of Beacon Object Files☆614Updated 2 years ago
- C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can…☆541Updated 4 years ago
- Windows对抗沙箱和虚拟机的方法总结☆399Updated 5 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- Support ALL Windows Version☆719Updated 5 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆336Updated 3 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆607Updated 2 years ago
- Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.…☆846Updated 2 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆667Updated last year
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆397Updated 5 years ago
- Bypass UAC by hijacking a DLL located in the Native Image Cache☆211Updated 3 years ago
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆688Updated 3 years ago