CrossC2 / autoRebind
Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code
☆19Updated last year
Related projects: ⓘ
- dump lsass☆35Updated 2 years ago
- Silently Install Chrome Extension For Persistence☆40Updated 2 months ago
- ☆41Updated this week
- CrackMapExec extension module/protocol support☆40Updated last year
- MSSQL CLR for pentest.☆50Updated last year
- ☆29Updated last year
- ☆44Updated 2 months ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- resource-based constrained delegation RBCD☆41Updated 2 years ago
- ☆28Updated 10 months ago
- ☆44Updated 3 years ago
- CobaltStrike Malleable Profile☆23Updated 2 years ago
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆29Updated 2 years ago
- Csharp 反射加载dll☆39Updated 3 years ago
- cmd2shellcode☆78Updated 3 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 2 years ago
- more conveniently Visual-Studio-BOF-template☆45Updated last year
- WebGuard是根据 风起师傅的RedGuard 和 mgeeky师傅的RedWarden结合出来的http请求过滤器go包,亦在帮助采用go编写C2 http监听器做流量过滤和规则匹配☆31Updated 2 years ago
- ☆20Updated 10 months ago
- command execute without 445 port☆50Updated 2 years ago
- Bypass EDR Create TaskServers☆34Updated last year
- ☆31Updated this week
- ☆18Updated 2 years ago
- AddDefenderExclusions Beacon Object File☆31Updated last year
- 调用x64dbg中的loadll.exe白加黑示例代码☆59Updated 3 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆38Updated last year
- PortBender修改为exe版本☆22Updated last year
- desktop screenshot☆29Updated last year
- geacon for apt profile☆20Updated 2 years ago