Like0x / 0xagentLinks
CobaltStrike 4.0 - 4.5 Patch
☆178Updated 3 years ago
Alternatives and similar repositories for 0xagent
Users that are interested in 0xagent are comparing it to the libraries listed below
Sorting:
- Cobalt Strike AggressorScripts For Red Team☆157Updated 4 years ago
- Implement load Cobalt Strike & Metasploit&Sliver shellcode with golang☆123Updated 2 years ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆278Updated 2 years ago
- A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.☆162Updated 3 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆192Updated 3 years ago
- NTLM relay test.☆194Updated 6 months ago
- HackBrowserData的反射模块☆176Updated 4 years ago
- 破解CS4.0☆163Updated 5 years ago
- ☆102Updated 3 years ago
- Use to build an anonymous SMB file server.☆232Updated 4 years ago
- Some Service DCOM Object and SeImpersonatePrivilege abuse.☆369Updated 3 years ago
- PoC for the CVE-2022-41080 , CVE-2022-41082 and CVE-2022-41076 Vulnerabilities Affecting Microsoft Exchange Servers☆95Updated 2 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated last year
- Dumping Windows Local Credentials Tools/Tricks☆69Updated 5 years ago
- LOLBINs that inject a DLL into a given process ID.☆139Updated 4 years ago
- Another Go Shellcode Loader using Windows APIs☆140Updated 4 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆88Updated 2 years ago
- Take a screenshot without injection for Cobalt Strike☆201Updated 2 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- Some Attacks of Exchange SSRF ProxyLogon&ProxyShell☆166Updated 4 years ago
- Offensive C# Tooling☆101Updated last year
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 3 years ago
- ProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)☆123Updated 4 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆58Updated 4 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 3 years ago
- ReflectiveDLL☆156Updated 5 years ago
- Go实现部分Rubeus功能,可执行asktgt, asktgs, s4u, describe ticket, renew ticket, asreproast等☆142Updated 3 years ago
- Memshell☆291Updated 4 years ago
- powershell codes of my blog.☆103Updated 6 years ago
- An EternalBlue exploit implementation in pure go☆101Updated 5 years ago