WBGlIl / go-ReflectiveDLLLinks
ReflectiveDLL
☆156Updated 5 years ago
Alternatives and similar repositories for go-ReflectiveDLL
Users that are interested in go-ReflectiveDLL are comparing it to the libraries listed below
Sorting:
- ☆51Updated 4 years ago
- ☆89Updated 3 years ago
- 破解CS4.0☆162Updated 5 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- bypass BeaconEye☆89Updated 4 years ago
- cmd2shellcode☆79Updated 4 years ago
- Beacon.dll reverse☆141Updated 4 years ago
- ReturnGate, just like HellsGate.☆68Updated 3 years ago
- ☆92Updated 4 years ago
- An EternalBlue exploit implementation in pure go☆101Updated 5 years ago
- HackBrowserData的反射模块☆176Updated 4 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated last year
- 白文件扫描器 非公开☆29Updated 4 years ago
- 记录一下我学习的Win32CPP☆56Updated 5 months ago
- ReflectiveDLL学习代码☆35Updated 5 years ago
- ☆102Updated 3 years ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆48Updated 4 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆89Updated 4 years ago
- geacon for apt profile☆21Updated 3 years ago
- CVE-2020-0787的简单回显☆33Updated 3 years ago
- 创建服务持久化☆108Updated 4 years ago
- c++ shellcode loader☆40Updated 3 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆65Updated last year
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆58Updated 4 years ago
- Offensive C# Tooling☆101Updated last year
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 3 years ago
- An easy way to getsystem by golang.☆55Updated 4 years ago
- [windows]pe -> shellcode -> shellcodeLoader -> (pe2shellcode go on?)☆78Updated 4 years ago
- CrossC2通信协议API实现☆84Updated 4 years ago
- LOLBINs that inject a DLL into a given process ID.☆139Updated 4 years ago