INT2ECALL / Cobaltstrike_4.3_Source
☆11Updated this week
Related projects: ⓘ
- 父进程欺骗,另类administrator提权到system☆30Updated 2 years ago
- 一个使用java和c++编写的RAT☆44Updated last year
- 通杀检测基于白文件patch黑代码的免杀技术的后门☆82Updated last month
- ☆43Updated last month
- Remote Download and Memory Execute for shellcode framework☆87Updated last year
- 过木马免杀制作器☆54Updated 11 months ago
- AV Bypass Shellcode Loader☆17Updated 2 years ago
- ReflectiveDLL☆153Updated 4 years ago
- 基于csharp实现的免杀shellcode加载器☆32Updated 3 years ago
- ☆53Updated last year
- ☆85Updated 3 years ago
- Get password/cookie/history from browser and use devtools protocol to bypass edr monitoring☆54Updated 7 months ago
- Bypass JVM Class ByteCode Verifier , 对抗反编译器☆106Updated last year
- 利用inline hook免杀绕过360,vt爆3个☆64Updated 2 years ago
- CSAgent 与 GoogleAuth 的缝合体,cobalt strike的破解+otp动态口令的agent☆136Updated 2 years ago
- XOR 加密 分离免杀☆63Updated 9 months ago
- 一种通过进程注入实现强制关闭部分 杀软进程的方法(以360安全卫士和360杀毒为例)☆117Updated 8 months ago
- 通过ACPI检测沙箱☆42Updated last year
- 异或shellcode和ppid欺骗免杀☆14Updated 2 years ago
- Bypass Windows Defender☆59Updated 2 years ago
- 过360拦截加载无驱动签名☆58Updated 2 years ago
- kill AV/EDR☆20Updated last year
- Invoke-Obfuscation-Bypass + PS2EXE 过主流杀软☆52Updated 3 years ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆64Updated last year
- Java utility that allows to inject shell code and execute it☆70Updated 2 years ago
- ☆21Updated this week
- 该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。☆29Updated 2 months ago
- 简单go加载器实现免杀360 火绒☆37Updated 2 years ago
- 简单致盲火绒Sysdiag杀毒软件☆20Updated 3 months ago
- 简单安排一下 autochk.sys 这个rootkit☆64Updated last year