XTeam-Wing / SharpMimikatzLinks
Csharp 反射加载dll
☆40Updated 3 years ago
Alternatives and similar repositories for SharpMimikatz
Users that are interested in SharpMimikatz are comparing it to the libraries listed below
Sorting:
- CrossC2通信协议API实现☆84Updated 4 years ago
- cmd2shellcode☆79Updated 4 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆88Updated 3 years ago
- 创建服务持久化☆107Updated 4 years ago
- This is learning to write windows 32 api instance code in the golang language☆40Updated 3 years ago
- 轻便的恶意反代☆48Updated 4 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- SystemGap - Maintenance Tools after privilege escalation☆41Updated last year
- 后渗透持久化控制平台; Windows Persistence Platform;☆48Updated 3 years ago
- ☆101Updated 2 years ago
- 自不量力的mimikatz分离计划☆44Updated 3 years ago
- ☆42Updated last year
- ☆27Updated 4 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆58Updated 3 years ago
- CobaltStrike and Google Auth twice☆65Updated 3 years ago
- golang for socks5☆33Updated 4 years ago
- Apache-backdoor Apache 中间件模块后门☆52Updated 5 years ago
- ☆19Updated last year
- dump lsass☆37Updated 3 years ago
- 动态加解密shellcode并上线☆24Updated 4 years ago
- creddump bypass AV☆42Updated 4 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆63Updated last year
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Updated 3 years ago
- OXID_Find by Csharp(多线程) 通过OXID解析器获取Windows远程主机上网卡地址 From @RcoIl☆54Updated 5 years ago
- c++ shellcode loader☆40Updated 2 years ago
- Automatic credential collection☆21Updated 2 years ago
- An EternalBlue exploit implementation in pure go☆99Updated 4 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- An easy way to getsystem by golang.☆55Updated 3 years ago
- Py写的tsh的流量加解密过程。☆28Updated 2 years ago