antman1p / ShellCodeRunnerLinks
XOR Payload Encryptor for .NET and Payload Runner with Built-in XOR Decryptor
☆45Updated 6 years ago
Alternatives and similar repositories for ShellCodeRunner
Users that are interested in ShellCodeRunner are comparing it to the libraries listed below
Sorting:
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 5 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Updated 5 years ago
- ☆37Updated 7 years ago
- backdoor c2☆38Updated 5 years ago
- ☆39Updated 5 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆66Updated 10 months ago
- A standalone WMI protocol for CrackMapExec☆51Updated 5 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 4 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 4 years ago
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆27Updated 5 years ago
- StenographyShellcodeLoader☆43Updated 4 years ago
- Loader that loads shellcode from UUID's☆22Updated 4 years ago
- CVE-2019-1040 with Kerberos delegation☆33Updated 3 years ago
- CVE-2021-21972☆32Updated 4 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆34Updated 4 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- A collection of Cobalt Strike aggressor scripts☆18Updated 4 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 3 years ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆45Updated 4 years ago
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆91Updated 4 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Updated 7 years ago
- Reflective DLL Injection with obfuscated (XOR) shellcode☆73Updated 4 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆63Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 3 years ago
- ☆70Updated 4 years ago