blacknbunny / encdecshellcodeLinks
Shellcode Encrypter & Decrypter via XOR Cipher
☆60Updated 6 years ago
Alternatives and similar repositories for encdecshellcode
Users that are interested in encdecshellcode are comparing it to the libraries listed below
Sorting:
- Clear All Windows System Logs - AntiForensics☆53Updated 10 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Updated 5 years ago
- Obfuscated Invoke-Mimikatz☆53Updated 6 years ago
- Command and Control for C# Writing☆68Updated 2 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- XOR Payload Encryptor for .NET and Payload Runner with Built-in XOR Decryptor☆45Updated 6 years ago
- Collection of reverse shells☆56Updated 4 years ago
- Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.☆39Updated 4 years ago
- CVE-2021-21972☆33Updated 4 years ago
- server2012-Group-policy-RCE☆47Updated 5 years ago
- RDP pentest tools & scripts☆66Updated 5 years ago
- gui uac bypass (netplwiz.exe)☆66Updated 6 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 4 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- CVE-2020-14882 Weblogic-Exp☆17Updated 4 years ago
- Zimbra邮件系统漏洞 XXE/RCE/SSRF/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)☆75Updated 2 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆59Updated 8 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 4 months ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆67Updated last month
- Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.☆56Updated 2 years ago
- CVE-2020-3452 exploit☆24Updated 5 years ago
- CVE-2020-0688_EXP Auto trigger payload & encrypt method☆145Updated 5 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- ☆71Updated 4 years ago
- CVE-2020–14882 by Jang☆29Updated 4 years ago
- Basic password spraying tool for internal tests and red teaming☆91Updated 5 years ago
- SonicWALL SSL-VPN Web Server Vulnerable Exploit☆48Updated 4 years ago
- JScript RAT☆101Updated 4 years ago