DongHuangT1 / Geacon
☆93Updated this week
Related projects: ⓘ
- cmd2shellcode☆78Updated 3 years ago
- ☆98Updated 2 years ago
- dump lsass☆35Updated 2 years ago
- This is learning to write windows 32 api instance code in the golang language☆38Updated 2 years ago
- CrackMapExec extension module/protocol support☆40Updated last year
- CVE-2020-1472 C++☆83Updated 2 years ago
- ☆44Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- ☆41Updated this week
- MSSQL CLR for pentest.☆50Updated last year
- ☆68Updated this week
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 2 years ago
- Search msDS-AllowedToActOnBehalfOfOtherIdentity☆34Updated 2 years ago
- more conveniently Visual-Studio-BOF-template☆45Updated last year
- geacon for apt profile☆20Updated 2 years ago
- ☆46Updated 3 years ago
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆65Updated last year
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆87Updated 2 years ago
- ☆76Updated this week
- If you only have hash, you can still operate exchange☆66Updated 2 years ago
- resource-based constrained delegation RBCD☆41Updated 2 years ago
- exp for CVE-2019-0887☆16Updated 3 years ago
- command execute without 445 port☆50Updated 2 years ago
- ScareCrow loader binary source which easier to read and learn☆25Updated 2 years ago
- Bypass cobaltstrike beacon config scan☆84Updated 3 years ago
- Csharp 反射加载dll☆39Updated 3 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆20Updated 3 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆19Updated last year
- ☆47Updated this week
- ☆2Updated last year