汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/
☆77Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for AsmShellcodeLoader
Users that are interested in AsmShellcodeLoader are comparing it to the libraries listed below
Sorting:
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- UAC bypass for x64 Windows 7 - 11(无弹窗版)☆281Sep 5, 2022Updated 3 years ago
- 将dll exe 等转成shellcode 最后输出exe 可定制加载器模板 支持白文件的捆绑 shellcode 加密☆368Sep 8, 2022Updated 3 years ago
- OrcaC2是一款基于Websocket加密通信的多功能C&C框架,使用Golang实现。☆677Dec 30, 2022Updated 3 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆195Jun 18, 2024Updated last year
- dump lsass进程工具☆561Jul 20, 2023Updated 2 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Sep 15, 2022Updated 3 years ago
- Re-implement cmd.exe using windows api☆50Feb 7, 2023Updated 3 years ago
- ☆102Sep 14, 2022Updated 3 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Sep 15, 2022Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- 创建服务持久化☆108Apr 26, 2021Updated 4 years ago
- Fork & modify of Wireguard's Memmod☆34Aug 2, 2023Updated 2 years ago
- Direct system calls by nim☆14Mar 15, 2022Updated 4 years ago
- PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。☆148Sep 1, 2021Updated 4 years ago
- 远程创建任务计划工具☆190Apr 23, 2022Updated 3 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- CVE-2020-1472 C++☆84Sep 2, 2022Updated 3 years ago
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆408Aug 22, 2023Updated 2 years ago
- js免杀shellcode,绕过杀毒添加自启☆354Mar 16, 2021Updated 5 years ago
- ☆61Jan 9, 2023Updated 3 years ago
- 创建隐藏计划任务,权限维持,Bypass AV☆559Sep 1, 2021Updated 4 years ago
- CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能☆730Sep 1, 2021Updated 4 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago
- .NET assembly loader with patchless AMSI and ETW bypass☆374Apr 19, 2023Updated 2 years ago
- 收集云沙箱上线C2的ip,如微X、奇XX、3X0、virustX等☆125Oct 23, 2023Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated last month
- 调用x64dbg中的loadll.exe白加黑示例代码☆65Jun 18, 2024Updated last year
- Some Service DCOM Object and SeImpersonatePrivilege abuse.☆372Dec 9, 2022Updated 3 years ago
- ☆40Feb 4, 2023Updated 3 years ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆55Jul 1, 2023Updated 2 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆239Jun 22, 2023Updated 2 years ago
- 基于rustdesk修改的远程桌面软件,将agent部分分离出来☆227Nov 14, 2023Updated 2 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆141Jun 25, 2020Updated 5 years ago
- CobaltWhispers is an aggressor script that utilizes a collection of Beacon Object Files (BOF) for Cobalt Strike to perform process inject…☆242Jan 4, 2023Updated 3 years ago
- 将shellcode用rsa加密并动态编译exe,自带几种反沙箱技术。☆520Jul 9, 2020Updated 5 years ago
- ErebusGate for Nim Bypass AV/EDR☆161Nov 7, 2022Updated 3 years ago
- Move CS beacon to GPU memory when sleeping☆251Nov 19, 2021Updated 4 years ago