CrossC2 / autoRebind
Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code
☆21Updated 2 years ago
Alternatives and similar repositories for autoRebind:
Users that are interested in autoRebind are comparing it to the libraries listed below
- Csharp 反射加载dll☆39Updated 3 years ago
- resource-based constrained delegation RBCD☆43Updated 3 years ago
- CVE-2020-1472 C++☆81Updated 2 years ago
- ☆45Updated 3 years ago
- dump lsass☆37Updated 2 years ago
- ☆30Updated last year
- Bypass EDR Create TaskServers☆36Updated 2 years ago
- Windows & linux Echo to file command converter☆23Updated 3 years ago
- cmd2shellcode☆78Updated 3 years ago
- CobaltStrike Malleable Profile☆23Updated 2 years ago
- MSSQL CLR for pentest.☆54Updated last year
- RPC 调用添加ssp扩展dump lsass☆17Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- ☆45Updated 7 months ago
- desktop screenshot☆29Updated last year
- ☆22Updated 2 years ago
- CrackMapExec extension module/protocol support☆42Updated last year
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆41Updated last year
- ReflectiveDLL学习代码☆33Updated 4 years ago
- 轻便的恶意反代☆45Updated 3 years ago
- ☆21Updated last year
- ScareCrow loader binary source which easier to read and learn☆25Updated 2 years ago
- ☆39Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆23Updated 10 months ago
- UAC_wenpon☆48Updated 3 years ago
- ☆3Updated 2 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Updated 2 years ago
- creddump bypass AV☆41Updated 4 years ago
- ☆15Updated last year