aqeisi / 7-ZipPostExp
Post-Exploitation script to exfiltrate 7-zip files
☆10Updated 2 years ago
Alternatives and similar repositories for 7-ZipPostExp:
Users that are interested in 7-ZipPostExp are comparing it to the libraries listed below
- Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215☆17Updated 2 years ago
- SyscallLoader☆10Updated 3 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆12Updated 2 years ago
- F5 BIG-IP 任意文件读取+远程命令执行RCE☆13Updated 4 years ago
- ☆18Updated 2 years ago
- Windows Persistence Collection☆12Updated 3 years ago
- auto MITM attack tools☆13Updated last year
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Updated 4 years ago
- Terminate the eventlog thread to disable the windows eventlog☆20Updated 4 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Updated last year
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18Updated 4 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆26Updated 4 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 3 years ago
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆25Updated 9 months ago
- Use current thread token to execute command☆15Updated 4 years ago
- ☆21Updated 3 years ago
- Beacon Object Files.☆35Updated last year
- EventViewer Bypass Uac Bof☆21Updated 2 years ago
- Cobalt Strike Get clipboard plugin☆12Updated last year
- Zimbra CVE-2022-37042 Nuclei weaponized template☆19Updated 2 years ago
- Tool scan EternalBlue by golang☆22Updated 5 years ago
- Caeser Cipher your shellcode!☆20Updated 3 years ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated last year
- Ntdll Unhooking POC☆19Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 2 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆32Updated 6 months ago
- Collection of self-made Red Team tools that have come in handy☆11Updated 6 months ago
- ☆19Updated 4 years ago