C# loader for msfvenom shellcode with AMSI bypass
☆34Jun 13, 2020Updated 5 years ago
Alternatives and similar repositories for CsharpAmsiBypass
Users that are interested in CsharpAmsiBypass are comparing it to the libraries listed below
Sorting:
- A repo to hold any bypasses I work on/study/whatever☆19Dec 30, 2020Updated 5 years ago
- Active Directory ntSecurityDescriptor parser☆14Updated this week
- SharpAddDomainMachine☆69Oct 12, 2021Updated 4 years ago
- decrypt rdp credentials to password using mimikatz.☆28Dec 18, 2020Updated 5 years ago
- RDI implementation in Nim☆64Dec 12, 2020Updated 5 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆244Aug 12, 2020Updated 5 years ago
- weaponized tool for CVE-2020-17144☆158Dec 9, 2020Updated 5 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆251Mar 31, 2021Updated 4 years ago
- VMware vCenter(Unauthenticated)☆18Nov 2, 2020Updated 5 years ago
- DLLhijack winmm.dll☆116May 20, 2024Updated last year
- 本项目是一篇NTLM中高级进阶进阶文章,后续我也会在Github和Gitbook对此文进行持续性的更新NTLM以及常见的协议中高级进阶并计划开源部分协议调试工具,望各位issue勘误。☆113Jul 10, 2020Updated 5 years ago
- Allow a Go process to dynamically load .NET assemblies☆150Mar 28, 2020Updated 5 years ago
- CVE-2021-3156非交互式执行命令☆203Feb 9, 2021Updated 5 years ago
- BlowBeef is a tool for analyzing WMI data.☆18Jul 26, 2021Updated 4 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- .NET 4.0 WinRM API Command Execution☆166Sep 11, 2020Updated 5 years ago
- 通过NetSessionEnum获取域内机器对应用户☆67May 6, 2020Updated 5 years ago
- dump foxmail password 提取foxmail中存储的邮箱密码☆22Jan 26, 2018Updated 8 years ago
- Enable-All-Tokens is a Go-based project designed to adjust and enable a list of specified privileges for the current process token on a W…☆10Apr 21, 2025Updated 10 months ago
- Shellcode injection POC using syscalls.☆117Jun 5, 2020Updated 5 years ago
- JNDI注入测试工具改版(A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability,like Jackson,Fastjson,et…☆49Nov 14, 2020Updated 5 years ago
- .NET 4.0 Remote Desktop Manager Password Gatherer☆81Sep 29, 2020Updated 5 years ago
- Steal privileged token to obtain SYSTEM shell☆252Jul 14, 2020Updated 5 years ago
- Godzilla v1.0 source code☆38Aug 26, 2020Updated 5 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆246Apr 30, 2020Updated 5 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- Citrix ADC Vulns☆86Jul 10, 2020Updated 5 years ago
- 清除基于java agent木马☆80Apr 12, 2021Updated 4 years ago
- Remove API hooks from a Beacon process.☆282Sep 18, 2021Updated 4 years ago
- Exploit and detect tools for CVE-2020-0688☆356Mar 21, 2020Updated 5 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Apr 17, 2020Updated 5 years ago
- Shellcode injector using direct syscalls☆123Aug 17, 2020Updated 5 years ago
- Using "svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc" as trigger☆58Oct 7, 2020Updated 5 years ago
- DInvisibleRegistry☆82Nov 20, 2020Updated 5 years ago
- ☆163Apr 25, 2022Updated 3 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Mar 5, 2020Updated 5 years ago
- fastjson 1.2.68 版本 autotype bypass☆142Jun 17, 2022Updated 3 years ago