CrossC2 / autoRebind
Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code
☆21Updated 2 years ago
Alternatives and similar repositories for autoRebind
Users that are interested in autoRebind are comparing it to the libraries listed below
Sorting:
- resource-based constrained delegation RBCD☆44Updated 3 years ago
- ☆46Updated 4 years ago
- Bypass EDR Create TaskServers☆36Updated 2 years ago
- CVE-2020-1472 C++☆82Updated 2 years ago
- ☆30Updated 2 years ago
- CrackMapExec extension module/protocol support☆42Updated last year
- dump lsass☆37Updated 2 years ago
- Csharp 反射加载dll☆40Updated 3 years ago
- ☆23Updated 2 weeks ago
- UAC_wenpon☆48Updated 3 years ago
- ☆45Updated 10 months ago
- Windows & linux Echo to file command converter☆24Updated 3 years ago
- MSSQL CLR for pentest.☆53Updated last year
- desktop screenshot☆29Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 3 years ago
- ☆23Updated 2 years ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆43Updated last year
- ScareCrow loader binary source which easier to read and learn☆25Updated 3 years ago
- ☆49Updated 3 years ago
- creddump bypass AV☆42Updated 4 years ago
- c/s网络准入平台☆20Updated 2 years ago
- ☆31Updated last year
- ☆40Updated last year
- cmd2shellcode☆79Updated 4 years ago
- query specific user and login IP from remote machine☆17Updated 2 years ago
- CobaltStrike Malleable Profile☆23Updated 2 years ago
- command execute without 445 port☆52Updated 3 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆23Updated 4 years ago