Rvn0xsy / Invoke-x64dbg-loaddllLinks
调用x64dbg中的loadll.exe白加黑示例代码
☆64Updated last year
Alternatives and similar repositories for Invoke-x64dbg-loaddll
Users that are interested in Invoke-x64dbg-loaddll are comparing it to the libraries listed below
Sorting:
- CVE-2020-1472 C++☆83Updated 3 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆88Updated 3 years ago
- 替代PrintBug 用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- 一个基于DNS隧道的简单C2☆59Updated 3 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated last year
- cmd2shellcode☆79Updated 4 years ago
- CrossC2通信协议API实现☆84Updated 4 years ago
- c/s网络准入平台☆20Updated 2 years ago
- 用来存放平时写的一些net内存马,仅用于练手,需要可以自行修改☆87Updated 3 years ago
- 批量检查远程桌面密码或ntlm是否正确☆41Updated 4 years ago
- impacket编程手册☆105Updated last year
- Csharp 反射加载dll☆41Updated 4 years ago
- 利用NTLM Hash读取Exchange邮件☆59Updated 2 years ago
- ☆46Updated 4 years ago
- ☆50Updated 4 years ago
- ☆102Updated 2 years ago
- 密码收集☆58Updated 3 years ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆68Updated 2 years ago
- An EternalBlue exploit implementation in pure go☆99Updated 4 years ago
- c++ shellcode loader☆40Updated 3 years ago
- 与反病毒软件老大哥们的打闹日常☆13Updated 6 years ago
- 轻便的恶意反代☆48Updated 4 years ago
- [windows]pe -> shellcode -> shellcodeLoader -> (pe2shellcode go on?)☆78Updated 3 years ago
- (批量化改造)sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆108Updated 4 years ago
- 利用EFSRPC协议批量探测出网☆65Updated last year
- Search msDS-AllowedToActOnBehalfOfOtherIdentity☆35Updated 3 years ago
- MSSQL CLR for pentest.☆55Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆58Updated 3 years ago
- ☆49Updated 2 years ago
- CobaltStrike and Google Auth twice☆64Updated 3 years ago