X1r0z / cpploaderLinks
c++ shellcode loader
☆40Updated 3 years ago
Alternatives and similar repositories for cpploader
Users that are interested in cpploader are comparing it to the libraries listed below
Sorting:
- cmd2shellcode☆79Updated 4 years ago
- Csharp 反射加载dll☆40Updated 4 years ago
- creddump bypass AV☆42Updated 4 years ago
- 自不量力的mimikatz分离计划☆44Updated 3 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆88Updated 3 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- 动态加解密shellcode并上线☆24Updated 4 years ago
- 创建服务持久化☆107Updated 4 years ago
- UAC_wenpon☆49Updated 3 years ago
- bypass BeaconEye☆88Updated 3 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆63Updated last year
- 批量检查远程桌面密码或ntlm是否正确☆41Updated 4 years ago
- CrossC2通信协议API实现☆84Updated 4 years ago
- Apache-backdoor Apache 中间件模块后门☆52Updated 5 years ago
- DomainFronting(aliyun)远程加载shellcode,远程获取shellcode使用aes动态加密传输数据☆48Updated 4 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆58Updated 3 years ago
- ☆50Updated 3 years ago
- CobaltStrike and Google Auth twice☆64Updated 3 years ago
- golang for socks5☆33Updated 4 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆48Updated 3 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- SystemGap - Maintenance Tools after privilege escalation☆41Updated last year
- This is learning to write windows 32 api instance code in the golang language☆40Updated 3 years ago
- An EternalBlue exploit implementation in pure go☆99Updated 4 years ago
- 用于Dump指定进程的内存,主要利用静默退出机制(SilentProcessExit)和Windows API(MiniDumpW)实现☆25Updated 3 years ago
- 轻便的恶意反代☆48Updated 4 years ago
- 记录一下我学习的Win32CPP☆55Updated 2 weeks ago
- 在原项目上加上将找到的文件压缩打包上传oss,另外做了部分小修改。☆30Updated 4 years ago
- ☆37Updated 7 years ago
- 与反病毒软件老大哥们的打闹日常☆13Updated 6 years ago