ac0d3r / 0xpeLinks
[windows]pe -> shellcode -> shellcodeLoader -> (pe2shellcode go on?)
☆78Updated 4 years ago
Alternatives and similar repositories for 0xpe
Users that are interested in 0xpe are comparing it to the libraries listed below
Sorting:
- ☆51Updated 4 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆65Updated last year
- CrossC2通信协议API实现☆84Updated 4 years ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆73Updated 3 years ago
- This is learning to write windows 32 api instance code in the golang language☆42Updated 4 years ago
- CobaltStrikeDetect☆49Updated 7 months ago
- ☆92Updated 4 years ago
- Csharp 反射加载dll☆41Updated 4 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Updated 2 years ago
- 过360拦截加载无驱动签名☆60Updated 4 years ago
- 记录一下我学习的Win32CPP☆56Updated 5 months ago
- 替代PrintBug用 于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆89Updated 4 years ago
- ReturnGate, just like HellsGate.☆68Updated 3 years ago
- An EternalBlue exploit implementation in pure go☆101Updated 5 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated last year
- Obfuscate go binaries. 混淆 go 二进制文件中的函数名☆50Updated 4 years ago
- CVE-2020-1472 C++☆84Updated 3 years ago
- windows黑客编程基础(C\C++)☆44Updated 6 years ago
- UAC_wenpon☆49Updated 4 years ago
- Windows权限控制与其存在的安全问题☆59Updated 5 years ago
- 用于Dump指定进程的内存,主要利用静默退出机制(SilentProcessExit)和Windows API(MiniDumpW)实现☆25Updated 4 years ago
- ReflectiveDLL学习代码☆35Updated 5 years ago
- ☆89Updated 3 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆78Updated 3 years ago
- 轻便的恶意反代☆48Updated 4 years ago
- 一个基于DNS隧道的简单C2☆61Updated 3 years ago
- CS http Dynamic Encrypt Bridge.☆47Updated 4 years ago
- bypass BeaconEye☆89Updated 4 years ago
- ☆102Updated 3 years ago