EgeBalci / meterpreterLinks
Basic multi platform meterpreter loader module.
☆15Updated 5 years ago
Alternatives and similar repositories for meterpreter
Users that are interested in meterpreter are comparing it to the libraries listed below
Sorting:
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- PE file mapping and manipulation package.☆36Updated 3 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Updated 5 years ago
- Example of async client/server sockets in .NET 5☆17Updated 4 years ago
- An AV evasion PoC tool☆9Updated 7 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 5 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- ☆14Updated 5 years ago
- ☆36Updated 6 years ago
- I used this to see if an EDR is running in Safe Mode☆37Updated 4 years ago
- ☆52Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Updated 5 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 3 years ago
- adding a backdooruser using win32api☆80Updated 4 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 4 years ago
- Hide .Net assembly into png images☆36Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Updated 4 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Updated 6 years ago
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆27Updated 6 years ago
- Red Team C2 and Post Exploitation code☆36Updated last month
- Persistent through COM Hijacking☆22Updated 6 years ago
- Use to generate DLL through Visual Studio☆20Updated 8 years ago
- Hide Mimikatz From Process Lists☆17Updated 10 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 4 years ago
- ☆42Updated 6 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 3 years ago