Some anti-sandbox codes, copy directly to strengthen your own ShellCode
☆12Dec 26, 2022Updated 3 years ago
Alternatives and similar repositories for FanBox
Users that are interested in FanBox are comparing it to the libraries listed below
Sorting:
- ☆11Aug 8, 2022Updated 3 years ago
- Bypass EDR Create TaskServers☆39Dec 24, 2022Updated 3 years ago
- query specific user and login IP from remote machine☆18Nov 19, 2022Updated 3 years ago
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆45Mar 2, 2023Updated 3 years ago
- 关于RPC一些绕EDR的tips☆198Mar 3, 2023Updated 3 years ago
- 重构Beacon☆15Aug 25, 2024Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- A cross platform C2/post-exploitation framework☆55Nov 2, 2025Updated 4 months ago
- ☆23May 28, 2021Updated 4 years ago
- C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can…☆17Sep 8, 2021Updated 4 years ago
- 域名接管漏洞,批量检测工具☆11Oct 29, 2020Updated 5 years ago
- A Simple Proof Code for Extracting and Executing Shellcode from Event Logs☆27Mar 5, 2023Updated 3 years ago
- 邮件伪造+批量发送邮件 钓鱼专用☆18Jun 20, 2022Updated 3 years ago
- 重构Beacon☆165Aug 19, 2024Updated last year
- create schtasks bypass AV☆23Jul 14, 2024Updated last year
- windows 黑客技术编程技术详解配套的代码资源☆16Mar 5, 2020Updated 6 years ago
- Simulate per-process disconnection in red team environments☆113Jun 6, 2025Updated 9 months ago
- 蚁剑AES加密通信ASPX Webshell☆33Jul 13, 2021Updated 4 years ago
- ☆12Jul 11, 2023Updated 2 years ago
- 简单安排一下 autochk.sys 这个rootkit☆73Mar 7, 2023Updated 3 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- My Blog☆12Feb 4, 2026Updated last month
- shellcode loader by c++,免杀,bypass,☆15Sep 5, 2022Updated 3 years ago
- record some AD security and Red Team contents☆14Dec 10, 2019Updated 6 years ago
- mozi僵尸网络的模仿实现 a simulating implementation of mozi botNet virus☆15Jul 31, 2022Updated 3 years ago
- A C implementation for a stealth injection method☆38Jan 30, 2026Updated last month
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆71Updated this week
- CNVD-2023-27598☆18Apr 20, 2023Updated 2 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 9 months ago
- BOF combination of KillDefender and Backstab☆167Mar 23, 2023Updated 2 years ago
- 利用chrome扩展 dump 浏览器cookie https://saucer-man.com/information_security/787.html☆15Sep 9, 2021Updated 4 years ago
- lcx.exe cross-platform version☆12Mar 5, 2016Updated 10 years ago
- Execute codes From XSLT☆16Dec 28, 2016Updated 9 years ago
- A BOF to create a scheduled task using a COM object.☆16Dec 3, 2024Updated last year
- MySQL_Fake_Server-啄木鸟yso适配版☆45Sep 20, 2024Updated last year
- bootkit驱动映射,三环进程注入加载指定模块☆14Oct 8, 2024Updated last year
- PostgreSQL 提权辅助脚本☆34Aug 23, 2021Updated 4 years ago
- ☆15Aug 22, 2022Updated 3 years ago