WBGlIl / go-ReflectiveDLLLinks
ReflectiveDLL
☆156Updated 5 years ago
Alternatives and similar repositories for go-ReflectiveDLL
Users that are interested in go-ReflectiveDLL are comparing it to the libraries listed below
Sorting:
- ☆89Updated 3 years ago
- ☆50Updated 3 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated last year
- Beacon.dll reverse☆141Updated 3 years ago
- ReturnGate, just like HellsGate.☆68Updated 3 years ago
- cmd2shellcode☆79Updated 4 years ago
- bypass BeaconEye☆88Updated 3 years ago
- 记录一下我学习的Win32CPP☆55Updated 2 weeks ago
- 破解CS4.0☆163Updated 5 years ago
- ☆92Updated 4 years ago
- HackBrowserData的反射模块☆175Updated 4 years ago
- 白文件扫描器 非公开☆28Updated 3 years ago
- [windows]pe -> shellcode -> shellcodeLoader -> (pe2shellcode go on?)☆77Updated 3 years ago
- An EternalBlue exploit implementation in pure go☆99Updated 4 years ago
- ☆102Updated 2 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆88Updated 3 years ago
- CVE-2020-0787的简单回显☆31Updated 3 years ago
- Windows访问令牌查看及利用工具☆87Updated 4 years ago
- c++ shellcode loader☆40Updated 3 years ago
- UAC_wenpon☆49Updated 3 years ago
- ReflectiveDLL学习代码☆35Updated 5 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 4 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆63Updated last year
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆48Updated 3 years ago
- CrossC2通信协议API实现☆84Updated 4 years ago
- use aswArPot.sys to kill process☆68Updated 2 years ago
- geacon for apt profile☆21Updated 3 years ago
- Csharp 反射加载dll☆40Updated 4 years ago
- Golang implementation of Reflective load PE from memory☆62Updated 3 years ago