Rvn0xsy / MyWin32CPPLinks
记录一下我学习的Win32CPP
☆56Updated 4 months ago
Alternatives and similar repositories for MyWin32CPP
Users that are interested in MyWin32CPP are comparing it to the libraries listed below
Sorting:
- ☆89Updated 3 years ago
- Csharp 反射加载dll☆41Updated 4 years ago
- CrossC2通信协议API实现☆84Updated 4 years ago
- 使得Cobaltstrike支持Atexec☆88Updated 5 years ago
- 创建服务持久化☆108Updated 4 years ago
- cmd2shellcode☆79Updated 4 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- windows pc 端杀毒软件识别(需要tasklist 命令执行的结果)☆43Updated 5 years ago
- ☆51Updated 4 years ago
- bypass BeaconEye☆89Updated 4 years ago
- Dumping Windows Local Credentials Tools/Tricks☆68Updated 5 years ago
- creddump bypass AV☆43Updated 5 years ago
- c++ shellcode loader☆40Updated 3 years ago
- Bypass cobaltstrike beacon config scan☆84Updated 4 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated last year
- CVE-2020-1472 C++☆84Updated 3 years ago
- 破解CS4.0☆163Updated 5 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆89Updated 4 years ago
- An EternalBlue exploit implementation in pure go☆101Updated 5 years ago
- An easy way to getsystem by golang.☆55Updated 4 years ago
- 分析cobaltstrike c2 协议☆68Updated 5 years ago
- ☆68Updated 3 years ago
- 自不量力的mimikatz分离计划☆44Updated 4 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆65Updated last year
- Beacon.dll reverse☆141Updated 4 years ago
- ☆102Updated 3 years ago
- [windows]pe -> shellcode -> shellcodeLoader -> (pe2shellcode go on?)☆78Updated 4 years ago
- ☆82Updated 6 years ago
- https://rcoil.me/2019/09/%E3%80%90%E7%BC%96%E7%A8%8B%E3%80%91SharpDecryptPwd/ 的示例代码☆49Updated 5 years ago
- DomainFronting(aliyun)远程加载shellcode,远程获取shellcode使用aes动态加密传输数据☆48Updated 5 years ago