D0Gshuang / ShellcodeLoader_stagerLinks
☆19Updated 3 years ago
Alternatives and similar repositories for ShellcodeLoader_stager
Users that are interested in ShellcodeLoader_stager are comparing it to the libraries listed below
Sorting:
- ☆42Updated last year
- Bypass EDR Create TaskServers☆37Updated 2 years ago
- Fork & modify of Wireguard's Memmod☆33Updated 2 years ago
- ☆31Updated last year
- ☆30Updated 2 years ago
- command execute without 445 port☆52Updated 3 years ago
- AddDefenderExclusions Beacon Object File☆41Updated 2 years ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆26Updated last year
- ☆24Updated 4 months ago
- Golang implement winrm client with pass the hash☆31Updated last year
- BOF内存运行exe☆29Updated 2 years ago
- 一个普通的BOF用来BypassUAC☆22Updated last year
- ☆27Updated 2 years ago
- MSSQL CLR for pentest.☆55Updated 2 years ago
- RPC 调用添加ssp扩展dump lsass☆19Updated 3 years ago
- Enable RDP and set firewall by Windows API.☆20Updated 3 years ago
- Re-implement cmd.exe using windows api☆49Updated 2 years ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆49Updated 2 years ago
- More EFS coerced authentication method with PetitPotam.py☆26Updated 2 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆67Updated 3 years ago
- ☆34Updated 6 months ago
- Kill Everything AV/EDR☆27Updated 9 months ago
- ☆10Updated last year
- CVE-2023-21707 EXP☆28Updated 2 years ago
- load assembly executable file in memory☆41Updated 2 years ago
- ☆22Updated last year
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆53Updated 2 years ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆35Updated last month
- 一个demo☆24Updated last year