DimopoulosElias / SimpleShellcodeInjector
SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party application.
☆257Updated 3 years ago
Alternatives and similar repositories for SimpleShellcodeInjector:
Users that are interested in SimpleShellcodeInjector are comparing it to the libraries listed below
- Shellcode wrapper with encryption for multiple target languages☆436Updated 8 years ago
- Exploit and detect tools for CVE-2020-0688☆352Updated 5 years ago
- NTDS.dit offline dumper with non-elevated☆217Updated 7 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆540Updated 4 years ago
- cobaltstrike ms17-010 module and some other☆416Updated 5 years ago
- Aggressor Script, Kits, Malleable C2 Profiles, External C2 and so on☆544Updated 2 years ago
- Steal privileged token to obtain SYSTEM shell☆247Updated 4 years ago
- ☆186Updated 3 years ago
- about CobaltStrike☆150Updated last year
- BypassAV ShellCode Loader (Cobaltstrike/Metasploit)☆177Updated 5 years ago
- Cobalt Strike Python API☆297Updated 3 years ago
- Resources About Cobalt Strike. 100+ Tools And 200+ Posts.☆249Updated 4 years ago
- backdoor☆248Updated 5 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆174Updated 4 years ago
- CVE-2020-0796 Local Privilege Escalation POC☆241Updated 4 years ago
- WINDOWS TELEMETRY权限维持☆258Updated 4 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆593Updated 2 years ago
- Run shellcode from resource☆254Updated 4 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆240Updated 4 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆349Updated 5 years ago
- CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能☆709Updated 3 years ago
- A backdoor module for Apache2☆196Updated 5 years ago
- Cobalt Strike Aggressor 插件包☆669Updated 3 years ago
- CVE-2019-1040 with Exchange☆249Updated 3 years ago
- Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.…☆799Updated 2 years ago
- POCs for Shellcode Injection via Callbacks☆403Updated 4 years ago
- 🐶Cobalt Strike Shellcode Loader by Golang☆281Updated 3 years ago
- bluekeep exploit☆129Updated 3 years ago
- WarSQLKit is a fileless rootkit and attack tool I developed for MS-SQL. With this tool you can rootkit the SQL service that uses CLR on M…☆251Updated last year
- 破解CS4.0☆161Updated 5 years ago