Ivan1ee / NetDLLSpy
.NET后渗透下的权限维持,附下载DLL
☆202Updated 6 years ago
Alternatives and similar repositories for NetDLLSpy:
Users that are interested in NetDLLSpy are comparing it to the libraries listed below
- WarSQLKit is a fileless rootkit and attack tool I developed for MS-SQL. With this tool you can rootkit the SQL service that uses CLR on M…☆251Updated last year
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆241Updated 4 years ago
- 本项目是一篇NTLM中高级进阶进阶文章,后续我也会在Github和Gitbook对此文进行持续性的更新NTLM以及常见的协议中高级进阶并计划开源部分协议调试工具,望各位issue勘误。☆114Updated 4 years ago
- ☆156Updated 4 years ago
- ☆289Updated 5 years ago
- A JSP backdoor that enables under Tomcat hiding arbitrary JSP files, in addition to their access logs.☆214Updated 5 years ago
- ☆36Updated 3 years ago
- backdoor☆249Updated 5 years ago
- c# 读取登录过本机的登录失败或登录成功(4624,4625)的所有计算机信息,在内网渗透中快速定位运维管理人员。☆205Updated 5 years ago
- .net 命令执行的webshell☆98Updated 3 years ago
- 绕过杀毒软件添加用户☆96Updated 5 years ago
- about CobaltStrike☆150Updated last year
- 一款基于webshell命令执行功能实现的GUI webshell管理工具,支持流量加密☆216Updated 3 years ago
- GUI Exploit Tool For RedTeam☆7Updated 3 years ago
- 利用长亭xray高级版的回显Gadget重写的一个shiro反序列化利用工具。☆123Updated 4 years ago
- This project is used to collect the EXP/POC disclosed on the Internet and provide project support for Heptagram security team.☆81Updated 8 months ago
- 鱼儿在cs上线后自动收杆|Automatically stop fishing in javascript after the fish is hooked☆134Updated 4 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆136Updated 4 years ago
- Source code of Behinder, a shell manager.冰蝎源码,反编译,当前版本3.0 Beta6,支持内存马注入☆90Updated 3 years ago
- Linux C2 框架demo,为期2周的”黑客编程马拉松“,从学习编程语言开始到实现一个demo的产物☆225Updated 2 years ago
- reGeorg的特殊版本,适用于老版本weblogic。☆154Updated 4 years ago
- 内网渗透中快速获取数据库所有库名,表名,列名。具体判断后再去翻数据,节省时间。适用于mysql,mssql。☆199Updated 5 years ago
- AntSword is a cross-platform website management toolkit.☆48Updated 4 years ago
- WINDOWS TELEMETRY权限维持☆259Updated 4 years ago
- .net反序列化课程中提到的漏洞检测工具☆175Updated 5 years ago
- nim一键免杀☆212Updated 3 years ago
- ☆77Updated 6 years ago
- EW重构计划☆64Updated 9 years ago
- cve-2020-1472 复现利用及其exp☆109Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆102Updated 4 years ago