RalfHacker / HTTPServerWithUploadLinks
Python3 HTTP Server with upload functionality
☆19Updated 2 years ago
Alternatives and similar repositories for HTTPServerWithUpload
Users that are interested in HTTPServerWithUpload are comparing it to the libraries listed below
Sorting:
- Execute commands in other Sessions☆91Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆85Updated 2 years ago
- A C# port from Invoke-GhostTask☆119Updated 2 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆105Updated last year
- C# havoc implant☆101Updated 2 years ago
- ☆93Updated 2 years ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆81Updated last year
- ☆102Updated 2 years ago
- ☆74Updated last year
- Aggressor script add-in for CobaltStrike to track file uploads☆49Updated 3 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated 2 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆51Updated last year
- Run Cobalt Strike BOFs in Brute Ratel C4!☆85Updated 9 months ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆145Updated 4 years ago
- Lsass dumper evading (all ?) EDR detection☆41Updated 2 months ago
- ☆57Updated last year
- Winsocket for Cobalt Strike.☆102Updated 2 years ago
- ProcExp Driver (Ab)use☆22Updated 3 years ago
- ☆129Updated 2 years ago
- ☆92Updated last year
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆172Updated last year
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆49Updated 3 months ago
- Cobalt Strike BOF that identifies Attack Surface Reduction (ASR) rules, actions, and exclusion locations☆160Updated last year
- ☆84Updated 2 years ago
- .bin file to shellcode convertor☆39Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Updated 3 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆90Updated last year
- ☆122Updated 2 years ago
- Parses Cobalt Strike malleable C2 profiles.☆60Updated last week