FunnyWolf / vipermsf
viper 自定义的msf
☆92Updated 4 months ago
Related projects: ⓘ
- viper 后台代码☆78Updated 8 months ago
- ☆55Updated this week
- 收集目标主机信息,包括最近打开文件,系统环境变量和回收站文件等等☆112Updated 4 years ago
- Microsoft Office Word Rce 复现(CVE-2022-30190)☆57Updated 2 years ago
- ☆157Updated this week
- Implement load Cobalt Strike & Metasploit&Sliver shellcode with golang☆125Updated last year
- bypass AV生成工具,目前免杀效果不是很好了,但是过个360,火绒啥的没问题☆104Updated 2 years ago
- 连接eval一句话webshell,获得可交互的虚拟终端☆97Updated 2 years ago
- 17条检测cobaltstrike的suricata-ids规则☆60Updated 2 years ago
- ☆98Updated this week
- mysql蜜罐,获取攻击者微信。公众号:台下言书☆51Updated 3 years ago
- CVE-2021-22192 靶场: 未授权用户 RCE 漏洞☆36Updated last year
- Offensive C# Tooling☆99Updated 3 years ago
- .net 命令执行的webshell☆98Updated 3 years ago
- webshell manager libraries | 网站管理工具☆122Updated 2 years ago
- windows pc 端杀毒软件识别(需要tasklist 命令执行的结果)☆40Updated 3 years ago
- 来自 gloxec 的 CrossC2 frameworkfork 备份 2.0版本☆33Updated 3 years ago
- cobaltstrike4.5版本破/解、去除checksum8特征、bypass BeaconEye、修复错误路径泄漏stage、增加totp双因子验证、修复CVE-2022-39197等☆35Updated last year
- ☆98Updated this week
- Gscan is a high concurrency scanner based on golang☆78Updated 4 years ago
- 漏洞利用框架☆54Updated 11 months ago
- Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。☆90Updated 2 years ago
- PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。☆145Updated 3 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆135Updated 4 years ago
- https://rcoil.me/2019/09/%E3%80%90%E7%BC%96%E7%A8%8B%E3%80%91SharpDecryptPwd/ 的示例代码☆49Updated 3 years ago
- geacon:简单适配了一个profile配置文件,可直接拿来修改使用,用于cs上线linux.☆157Updated 2 years ago
- proxylogon exploit - CVE-2021-26857☆113Updated 3 years ago
- NPS proxy server authentication bypasses vulnerability detection☆75Updated 2 years ago
- Cobalt Strike < 4.4 dos CVE-2021-36798☆37Updated 3 years ago
- go shellcode 加载器☆61Updated 5 years ago