blacknbunny / encdecshellcode
Shellcode Encrypter & Decrypter via XOR Cipher
☆59Updated 5 years ago
Alternatives and similar repositories for encdecshellcode:
Users that are interested in encdecshellcode are comparing it to the libraries listed below
- Passwordless RDP Session Hijacking☆66Updated 3 years ago
- ☆38Updated 5 years ago
- Collection of various Aggressor Scripts for Cobalt Strike from awesome people. Will be sure to update this repo with credit to each perso…☆63Updated 7 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆65Updated 9 months ago
- Clear All Windows System Logs - AntiForensics☆53Updated 9 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago
- Automatic ProxyShell Exploit☆114Updated 3 years ago
- Cobalt Strike Aggressor Scripts☆30Updated 8 years ago
- Zimbra邮件系统漏洞 XXE/RCE/SSRF/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)☆74Updated 2 years ago
- Obfuscated Invoke-Mimikatz☆52Updated 6 years ago
- Cobaltstrike Aggressor Scripts☆28Updated 7 years ago
- CVE-2021-21972☆32Updated 4 years ago
- com_media allowed paths that are not intended for image uploads to RCE☆71Updated 4 years ago
- Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.☆39Updated 3 years ago
- Cobalt Strike Team Server Password Brute Forcer☆28Updated 4 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 4 years ago
- PoC para las vulnerabilidades CVE-2020-14750 y cve-2020-14882☆48Updated 4 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Updated 5 years ago
- Aggressor Scripts for Cobalt Strike☆76Updated last year
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Updated 5 years ago
- generate CobaltStrike's cross-platform payload☆34Updated 10 months ago
- Use Waitfor.exe to maintain persistence☆54Updated 4 years ago
- ☆37Updated 7 years ago
- Cobalt Strike AggressorScripts CVE-2020-0796☆78Updated 4 years ago
- Ladon Moudle MS17010 Exploit for PowerShell☆49Updated 5 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Updated 7 years ago
- Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.☆55Updated 2 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆110Updated 5 years ago
- Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)☆40Updated 4 years ago