Rvn0xsy / Invoke-x64dbg-loaddll
调用x64dbg中的loadll.exe白加黑示例代码
☆61Updated 9 months ago
Alternatives and similar repositories for Invoke-x64dbg-loaddll:
Users that are interested in Invoke-x64dbg-loaddll are comparing it to the libraries listed below
- CVE-2020-1472 C++☆82Updated 2 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆148Updated 3 years ago
- Csharp 反射加载dll☆40Updated 3 years ago
- Github Security Daily Repository.☆45Updated 3 years ago
- cmd2shellcode☆78Updated 3 years ago
- c++ shellcode loader☆40Updated 2 years ago
- 轻便的恶意反代☆48Updated 3 years ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆66Updated 2 years ago
- ☆49Updated 3 years ago
- (批量化改造)sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆107Updated 4 years ago
- 批量检查远程桌面密码或ntlm是否正确☆41Updated 4 years ago
- UAC_wenpon☆48Updated 3 years ago
- C# shellcode runner adapted to run from a csproj to be triggered by MSBuild☆25Updated 3 years ago
- creddump bypass AV☆42Updated 4 years ago
- 一个基于DNS隧道的简单C2☆59Updated 2 years ago
- resource-based constrained delegation RBCD☆44Updated 3 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆88Updated 3 years ago
- MSSQL CLR for pentest.☆53Updated last year
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- hyscan HengGe Team☆68Updated 3 years ago
- ☆3Updated 2 years ago
- Bypass EDR Create TaskServers☆36Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 3 years ago
- ☆46Updated 3 years ago
- c/s网络准入平台☆20Updated 2 years ago
- An EternalBlue exploit implementation in pure go☆95Updated 4 years ago
- Automatic credential collection☆22Updated 2 years ago
- Windows & linux Echo to file command converter☆23Updated 3 years ago
- 利用NTLM Hash读取Exchange邮件☆61Updated last year
- Golang implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆26Updated 3 years ago