HildeTeamTNT / malware
Malware that TeamTNT found and removed.
☆12Updated 3 years ago
Related projects: ⓘ
- 欺骗wappalyzer插件指纹识别&XSS☆13Updated 2 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆30Updated 3 years ago
- Show AV Processes list☆14Updated 3 years ago
- works but not work, cao!☆24Updated 3 years ago
- BlackHat scrapy for download all the pdf file☆25Updated 3 months ago
- Detects attempts and successful exploitation of CVE-2022-26809☆31Updated this week
- ☆16Updated 4 years ago
- ☆26Updated 3 years ago
- Terminate the eventlog thread to disable the windows eventlog☆20Updated 4 years ago
- A collection of weaponized LPE exploits written in Go☆50Updated 9 months ago
- Rust Weaponization for Red Team Engagements.☆14Updated 2 years ago
- ☆21Updated 2 years ago
- CVE-2020-10204 远程命令执行脚本☆13Updated 4 years ago
- vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)☆37Updated 3 years ago
- inject shellcode into remote process via message hook☆15Updated 3 years ago
- Crypt/Decrypt Proxyshell Payload☆9Updated 3 years ago
- CVE-2020-14882 Weblogic-Exp☆17Updated 3 years ago
- ☆28Updated this week
- Cobalt Strike DNS beacon parser☆11Updated 2 years ago
- Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack☆26Updated 3 years ago
- ☆17Updated this week
- ☆20Updated this week
- Windows Persistence Collection☆12Updated 3 years ago
- SSRF 绕过 Payload☆15Updated 3 years ago
- StenographyShellcodeLoader☆42Updated 4 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18Updated 4 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated last year
- CVE-2020-10199 回显版本☆31Updated 2 months ago
- Use current thread token to execute command☆15Updated 3 years ago
- automatic privilege escalation by pspy☆22Updated 2 years ago