EgeBalci / meterpreterLinks
Basic multi platform meterpreter loader module.
☆15Updated 4 years ago
Alternatives and similar repositories for meterpreter
Users that are interested in meterpreter are comparing it to the libraries listed below
Sorting:
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- Package that provides different PE tricks to difficult the reverse engineering of your Windows applications.☆11Updated 5 years ago
- PE file mapping and manipulation package.☆36Updated 3 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- Windows Shellcode Testing Utility to Run Shellcode From A File☆12Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Updated last week
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆73Updated 6 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆29Updated 2 years ago
- Postgres Extension to Execute Shellcodes☆14Updated 4 years ago
- Chrome cookie dumper☆17Updated 4 years ago
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- golang String Obfuscate☆9Updated 3 years ago
- Reverse Windows shell over TLS☆19Updated 9 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 3 years ago
- interesting analysis☆16Updated 7 years ago
- Use to generate DLL through Visual Studio☆20Updated 7 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Updated 5 years ago
- An AV evasion PoC tool☆9Updated 7 years ago
- TrojanDropper/PS.Maloader.d☆12Updated 3 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Updated 5 years ago
- Experiments on the Windows Internals☆30Updated 5 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- PoC for CVE-2020-1015☆40Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆37Updated 4 years ago
- Persistent through COM Hijacking☆21Updated 6 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 3 years ago
- Hide Mimikatz From Process Lists☆17Updated 10 years ago
- ☆10Updated 3 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago