YanStar / Windows_Hack_Base_CodeLinks
windows黑客编程基础(C\C++)
☆44Updated 6 years ago
Alternatives and similar repositories for Windows_Hack_Base_Code
Users that are interested in Windows_Hack_Base_Code are comparing it to the libraries listed below
Sorting:
- 过360拦截加载无驱动签名☆60Updated 4 years ago
- [windows]pe -> shellcode -> shellcodeLoader -> (pe2shellcode go on?)☆78Updated 4 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆65Updated last year
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆73Updated 3 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆89Updated 4 years ago
- CVE-2020-1472 C++☆84Updated 3 years ago
- CrossC2通信协议API实现☆84Updated 4 years ago
- 用来存放平时写的一些net内存马,仅用于练手,需要可以自行修改☆89Updated 3 years ago
- 白文件扫描器 非公开☆29Updated 4 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated last year
- 与反病毒软件老大哥们的打闹日常☆13Updated 7 years ago
- 一个基于DNS隧道的简单C2☆60Updated 3 years ago
- UAC_wenpon☆49Updated 4 years ago
- c++ shellcode loader☆40Updated 3 years ago
- ☆51Updated 4 years ago
- 批量检查远程桌面密码或ntlm是否正确☆41Updated 4 years ago
- Windows权限控制与其存在的安全问题☆59Updated 5 years ago
- 利用图片隐写术来远程动态加载shellcode☆98Updated 3 years ago
- ☆92Updated 4 years ago
- Obfuscate go binaries. 混淆 go 二进制文件中的函数名☆50Updated 4 years ago
- 用于Dump指定进程的内存,主要利用静默退出机制(SilentProcessExit)和Windows API(MiniDumpW)实现☆25Updated 4 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Updated 2 years ago
- 内存加载执行golang elf二进制文件☆28Updated 4 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆18Updated 3 years ago
- ReflectiveDLL学习代码☆35Updated 5 years ago
- 记录一下我学习的Win32CPP☆56Updated 4 months ago
- 调用Windows Api,绕过杀软添加用户☆36Updated 5 years ago
- Csharp 反射加载dll☆41Updated 4 years ago
- PE学习小工具,它的作用就是将32位的PE文件的按内存对齐,然后合 并所有节,接着新增一个节存放Shellcode,将程序入口位置修改到Shellcode的位置。☆19Updated 3 years ago