DimopoulosElias / SimpleShellcodeInjector
SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party application.
☆257Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for SimpleShellcodeInjector
- Shellcode wrapper with encryption for multiple target languages☆434Updated 7 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆532Updated 4 years ago
- NTDS.dit offline dumper with non-elevated☆211Updated 6 years ago
- Steal privileged token to obtain SYSTEM shell☆244Updated 4 years ago
- Exploit and detect tools for CVE-2020-0688☆352Updated 4 years ago
- cobaltstrike ms17-010 module and some other☆417Updated 5 years ago
- Aggressor Script, Kits, Malleable C2 Profiles, External C2 and so on☆532Updated last year
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆170Updated 4 years ago
- ☆185Updated 3 years ago
- Resources About Cobalt Strike. 100+ Tools And 200+ Posts.☆245Updated 4 years ago
- BypassAV ShellCode Loader (Cobaltstrike/Metasploit)☆177Updated 5 years ago
- backdoor☆245Updated 5 years ago
- Cobalt Strike Python API☆292Updated 2 years ago
- CVE-2019-1040 with Exchange☆249Updated 3 years ago
- about CobaltStrike☆150Updated 11 months ago
- cve-2020-0688☆322Updated last year
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆411Updated 3 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆583Updated last year
- A backdoor module for Apache2☆193Updated 4 years ago
- CVE-2020-0796 Local Privilege Escalation POC☆240Updated 4 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Updated 5 years ago
- Run shellcode from resource☆253Updated 3 years ago
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆162Updated 4 years ago
- 破解CS4.0☆160Updated 4 years ago
- Programmatically create an administrative user under Windows☆178Updated 7 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆239Updated 4 years ago
- WINDOWS TELEMETRY权限维持☆256Updated 4 years ago