coca1ne / DLL_Hijacker
DLL_Hijacker.py
☆73Updated 8 years ago
Related projects: ⓘ
- Penetration test☆55Updated 3 years ago
- Search for information from manifests☆42Updated 5 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆80Updated 3 years ago
- bypass uac☆140Updated 6 years ago
- ☆57Updated this week
- ☆32Updated 7 years ago
- dll proxying☆52Updated 3 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆76Updated 5 years ago
- source code☆181Updated 5 years ago
- cknife(webshell manager)☆27Updated 6 years ago
- it works on xp (all version sp2 sp3)☆74Updated 4 years ago
- mig meterpreter stager☆41Updated 9 years ago
- Play Doh Windows ACL Tools☆60Updated 2 years ago
- ☆93Updated 3 years ago
- Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())☆102Updated 5 years ago
- ☆36Updated 4 years ago
- ShellCode Loader for MSF and Cobalt Strike☆54Updated 4 months ago
- Stealing passwords every time they change☆63Updated 4 years ago
- ZeroRAT是一款windows上的一句话远控☆57Updated 8 years ago
- integration ms17010 and nsa-EternalBlue☆36Updated 5 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆135Updated 4 years ago
- mstsc.exe Path Traversal to RCE POC☆90Updated 5 years ago
- a pass-the-hash tool☆107Updated 6 years ago
- ☆66Updated 2 years ago
- Web ExternalC2 Demo☆50Updated 4 years ago
- Antivirus Killer☆98Updated 6 years ago
- No inline asm,support x86/x64☆63Updated 3 years ago
- JScript RAT☆99Updated 3 years ago
- aggressor-script 中文翻译 aggressor-script 使用☆43Updated 6 years ago
- 分析cobaltstrike c2 协议☆67Updated 4 years ago