DamonMohammadbagher / NativePayload_ReverseShell
This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypassed via this method Very Simple)
☆111Updated last year
Related projects ⓘ
Alternatives and complementary repositories for NativePayload_ReverseShell
- Windows Defender ShellCode Execution Bypass☆126Updated 4 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆109Updated 4 years ago
- .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy P…☆165Updated 4 years ago
- .NET 4.0 Project to interact with video, audio and keyboard hardware.☆211Updated 5 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Updated 5 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆189Updated 3 years ago
- dem sharp donuts☆187Updated 2 years ago
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆197Updated 3 weeks ago
- SMBExec C# module☆214Updated 4 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆107Updated 4 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆188Updated 5 years ago
- Encrypting shellcode to Bypass AV☆70Updated 5 years ago
- C# remote process injection utility for Cobalt Strike☆84Updated 4 years ago
- Various Aggressor Scripts I've Created.☆148Updated 2 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆40Updated last year
- Windows NTLM Authentication Backdoor☆236Updated 3 years ago
- ☆111Updated 4 years ago
- My CobaltStrike BOFS☆159Updated 2 years ago
- Cobalt Strike Aggressor Scripts☆139Updated this week
- Shellcoding utilities☆219Updated 3 years ago
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆162Updated 4 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆197Updated 3 years ago
- A sort of simple shell which support multiple protocols.☆99Updated 5 years ago
- This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of alm…☆105Updated last year
- Example code for using named pipe output with beacon ReflectiveDLLs☆111Updated 4 years ago
- Manual Map DLL injection implemented with Cobalt Strike's Beacon Object Files.☆147Updated 4 years ago
- Shellcode injection POC using syscalls.☆117Updated 4 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆195Updated 3 years ago