AdminTest0 / Invoke-Obfuscation-Bypass
Invoke-Obfuscation-Bypass + PS2EXE 过主流杀软
☆53Updated 3 years ago
Alternatives and similar repositories for Invoke-Obfuscation-Bypass:
Users that are interested in Invoke-Obfuscation-Bypass are comparing it to the libraries listed below
- ☆100Updated 2 years ago
- 批量检查远程桌面密码或ntlm是否正确☆41Updated 3 years ago
- Shellcode Reductio Entropy Tools☆64Updated last year
- CobaltStrike Malleable Profile☆23Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- cobaltstrike免杀插件☆22Updated 2 years ago
- ☆3Updated 2 years ago
- 蚁剑AES加密通信ASPX Webshell☆31Updated 3 years ago
- kill windows log☆45Updated 11 months ago
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆31Updated 2 years ago
- CVE-2020-1472 C++☆81Updated 2 years ago
- Zerologon自动化脚本☆88Updated last year
- Cobalt Strike BOF that Add an admin user☆71Updated 2 years ago
- ☆49Updated last year
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆67Updated 2 years ago
- command execute without 445 port☆53Updated 3 years ago
- Get password/cookie/history from browser and use devtools protocol to bypass edr monitoring☆56Updated last year
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆71Updated last year
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Updated 2 years ago
- This is a daemon process which make a programe runing all time.☆84Updated 3 years ago
- CrackMapExec extension module/protocol support☆41Updated last year
- Zerologon exploit with restore DC password automatically☆132Updated last year
- WebSocket 内存马/Webshell,一种新型内存马/WebShell技术☆18Updated last year
- cmd2shellcode☆78Updated 3 years ago
- 用c#实现了个远程拉取Mimikatz.ps1☆59Updated last year
- 绕过杀软添加用户☆46Updated 4 years ago
- Windows Api调用,用来绕过杀软添加用户☆22Updated 3 years ago
- CrossC2通信协议API实现☆84Updated 3 years ago
- ☆91Updated 3 years ago
- Bypass国内主流杀软☆37Updated 2 years ago