Support ALL Windows Version
☆722Sep 11, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2020-0787-EXP-ALL-WINDOWS-VERSION
Users that are interested in CVE-2020-0787-EXP-ALL-WINDOWS-VERSION are comparing it to the libraries listed below
Sorting:
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,464Jan 20, 2025Updated last year
- Windows 权限提升 BadPotato☆889May 10, 2020Updated 5 years ago
- ☆1,380Jul 2, 2020Updated 5 years ago
- sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆715Aug 3, 2021Updated 4 years ago
- Modifying SweetPotato to support load shellcode and webshell☆787Jun 2, 2021Updated 4 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,348Dec 7, 2020Updated 5 years ago
- Exploit and detect tools for CVE-2020-0688☆356Mar 21, 2020Updated 5 years ago
- CobaltStrike后渗透测试 插件☆1,555Oct 28, 2021Updated 4 years ago
- 这是一个一键辅助抓取360安全浏览器密码的CobaltStrike脚本以及解密小工具,用于节省红队工作量,通过下载浏览器数据库、记录密钥来离线解密浏览器密码。☆638Apr 4, 2021Updated 4 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆246Apr 30, 2020Updated 5 years ago
- 这是一个抓取浏览器密码的工具,后续会添加更多功能☆1,455May 21, 2022Updated 3 years ago
- 记录自己编写、修改的部分工具☆1,461Oct 19, 2025Updated 4 months ago
- Bypass firewall for traffic forwarding using webshell☆1,430Sep 29, 2021Updated 4 years ago
- ☆159Aug 4, 2020Updated 5 years ago
- Cooolis-ms是一个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具,它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的…☆929Jan 7, 2026Updated 2 months ago
- 内网渗透中常用的c#程序整合成cs脚本,直接内存加载。持续更新~☆498Feb 13, 2020Updated 6 years ago
- CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell☆321Jan 21, 2020Updated 6 years ago
- Cobalt Strike插件 - RDP日志取证&清除☆363Dec 23, 2019Updated 6 years ago
- Collect JSP webshell of various implementation methods. 梳理和发现的JSP Webshell各种姿势☆1,404Jan 18, 2022Updated 4 years ago
- 利用NTLM Hash读取Exchange邮件☆441Jan 7, 2025Updated last year
- 通过 Redis 主从写出无损文件☆718May 25, 2020Updated 5 years ago
- 对密码已保存在 Windwos 系统上的部分程序进行解析,包括:Navicat,TeamViewer,FileZilla,WinSCP,Xmangager系列产品(Xshell,Xftp)。源码:https://github.com/RowTeam/SharpDecrypt…☆1,260Mar 16, 2022Updated 3 years ago
- Cobalt Strike插件,用于快速生成免杀的可执行文件☆914Jul 19, 2020Updated 5 years ago
- Exchange2010 authorized RCE☆157Dec 24, 2020Updated 5 years ago
- JNDI服务利用工具 RMI/LDAP,支持部分场景回显、内存shell,高版本JDK场景下利用等,fastjson rce命令执行,log4j rce命令执行 漏洞检测辅助工具☆2,011May 21, 2024Updated last year
- cobaltstrike ms17-010 module and some other☆419Jun 13, 2019Updated 6 years ago
- 免杀技术大杂烩---乱拳也打不死老师傅☆1,094Mar 29, 2021Updated 4 years ago
- WINDOWS TELEMETRY权限维持☆257Jul 2, 2020Updated 5 years ago
- Steal privileged token to obtain SYSTEM shell☆252Jul 14, 2020Updated 5 years ago
- 修改frp支持域前置与配置文件自删除☆397Dec 31, 2020Updated 5 years ago
- 内网域渗透小工具☆733Apr 20, 2021Updated 4 years ago
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,189Feb 15, 2023Updated 3 years ago
- ☆1,823Nov 24, 2025Updated 3 months ago
- Shiro550/Shiro721 一键化利用工具,支持多种回显方式☆1,952Jun 4, 2021Updated 4 years ago
- 将shellcode用rsa加密并动态编译exe,自带几种反沙箱技术。☆521Jul 9, 2020Updated 5 years ago
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,811Sep 4, 2024Updated last year
- generate CobaltStrike's cross-platform payload☆2,544Nov 20, 2023Updated 2 years ago
- Cobalt Strike Aggressor 插件包☆672Aug 31, 2021Updated 4 years ago