H4K6 / FilelessPELoaderLinks
将PE文件进行AES加密,然后从远程拉取加载内存中实现免杀
☆36Updated 2 years ago
Alternatives and similar repositories for FilelessPELoader
Users that are interested in FilelessPELoader are comparing it to the libraries listed below
Sorting:
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆89Updated 2 years ago
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆77Updated 2 years ago
- command execute without 445 port☆52Updated 3 years ago
- Shellcode Reductio Entropy Tools☆73Updated 2 years ago
- Cobalt Strike BOF that Add a user to localgroup by samr☆131Updated 2 years ago
- CrackMapExec extension module/protocol support☆42Updated 2 years ago
- Cobalt Strike BOF that Add an admin user☆78Updated 3 years ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆55Updated 2 years ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆34Updated 3 months ago
- ASPX ShellCode Loader☆53Updated last year
- ☆102Updated 3 years ago
- RPC 调用添加ssp扩展dump lsass☆20Updated 3 years ago
- ☆49Updated 2 years ago
- ☆34Updated 8 months ago
- ☆43Updated 2 years ago
- Take a screenshot without injection for Cobalt Strike☆201Updated 2 years ago
- Invoke-Obfuscation-Bypass + PS2EXE 过主流杀软☆54Updated 4 years ago
- MSSQL CLR for pentest.☆55Updated 2 years ago
- This is a third party agent for Havoc C2 written in golang.☆58Updated last year
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated last year
- Beacon Object File implementation of pwn1sher's KillDefender☆67Updated 3 years ago
- more conveniently Visual-Studio-BOF-template☆71Updated 2 years ago
- Get password/cookie/history from browser and use devtools protocol to bypass edr monitoring☆61Updated 6 months ago
- ☆36Updated 2 years ago
- ☆15Updated last year
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆58Updated 3 years ago
- 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。☆34Updated 3 years ago
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆44Updated 2 years ago
- resource-based constrained delegation RBCD☆45Updated 3 years ago
- ☆31Updated 2 years ago