AdminTest0 / Invoke-Obfuscation-BypassLinks
Invoke-Obfuscation-Bypass + PS2EXE 过主流杀软
☆54Updated 3 years ago
Alternatives and similar repositories for Invoke-Obfuscation-Bypass
Users that are interested in Invoke-Obfuscation-Bypass are comparing it to the libraries listed below
Sorting:
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- ☆100Updated 2 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- ☆3Updated 2 years ago
- CobaltStrike and Google Auth twice☆65Updated 3 years ago
- geacon for apt profile☆21Updated 2 years ago
- 批量检查远程桌面密码或ntlm是否正确☆41Updated 4 years ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆67Updated 2 years ago
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆31Updated 3 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆88Updated 3 years ago
- 过木马免杀制作器☆55Updated last year
- 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。☆33Updated 3 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- kill windows log☆45Updated last year
- 绕过杀软添加用户☆46Updated 4 years ago
- 用来存放平时写的一些net内存马,仅用于练手,需要可以自行修改☆87Updated 3 years ago
- CrossC2通信协议API实现☆84Updated 3 years ago
- cmd2shellcode☆79Updated 4 years ago
- 蚁剑AES加密通信ASPX Webshell☆31Updated 4 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆62Updated last year
- Get password/cookie/history from browser and use devtools protocol to bypass edr monitoring☆62Updated 2 months ago
- ☆35Updated 2 years ago
- cobaltstrike免杀插件☆22Updated 3 years ago
- ☆49Updated 2 years ago
- CrackMapExec extension module/protocol support☆42Updated last year
- Cobalt Strike BOF that Add an admin user☆77Updated 2 years ago
- CobaltStrike Malleable Profile☆23Updated 3 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Updated 2 years ago
- Csharp 反射加载dll☆40Updated 3 years ago
- This is a daemon process which make a programe runing all time.☆84Updated 3 years ago