CrossC2 / autoRebindLinks
Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code
☆21Updated 2 years ago
Alternatives and similar repositories for autoRebind
Users that are interested in autoRebind are comparing it to the libraries listed below
Sorting:
- MSSQL CLR for pentest.☆56Updated 2 years ago
- ☆102Updated 3 years ago
- resource-based constrained delegation RBCD☆46Updated 3 years ago
- ☆30Updated 2 years ago
- Bypass EDR Create TaskServers☆37Updated 3 years ago
- desktop screenshot☆29Updated 2 years ago
- ☆46Updated 4 years ago
- This is learning to write windows 32 api instance code in the golang language☆42Updated 3 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 3 years ago
- Csharp 反射加载dll☆41Updated 4 years ago
- ☆46Updated last year
- ☆51Updated 4 years ago
- dump lsass☆37Updated 3 years ago
- CrossC2通信协议API实现☆84Updated 4 years ago
- CVE-2020-1472 C++☆84Updated 3 years ago
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆34Updated 3 years ago
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆45Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆24Updated 4 years ago
- command execute without 445 port☆52Updated 3 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆89Updated 4 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 3 years ago
- RPC 调用添加ssp扩展dump lsass☆23Updated 3 years ago
- Golang implementation of Reflective load PE from memory☆63Updated 3 years ago
- CobaltStrike Malleable Profile☆23Updated 3 years ago
- cmd2shellcode☆79Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Updated 3 years ago
- Fork & modify of Wireguard's Memmod☆33Updated 2 years ago
- UAC_wenpon☆49Updated 4 years ago
- CrackMapExec extension module/protocol support☆42Updated 2 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆65Updated last year