crisprss / ProcessPlayerLinks
一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉
☆18Updated 3 years ago
Alternatives and similar repositories for ProcessPlayer
Users that are interested in ProcessPlayer are comparing it to the libraries listed below
Sorting:
- 自用的shellcode生成框架☆32Updated 2 years ago
- UAC_wenpon☆49Updated 3 years ago
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated last year
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated 2 years ago
- desktop screenshot☆29Updated 2 years ago
- Bypass EDR Create TaskServers☆36Updated 2 years ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆71Updated 2 years ago
- 域前置版本FRP☆15Updated 2 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Updated 3 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 3 years ago
- 过360拦截加载无驱动签名☆60Updated 4 years ago
- ☆92Updated 4 years ago
- ☆19Updated 3 years ago
- use aswArPot.sys to kill process☆68Updated 3 years ago
- bypass UAC even when configured to always notify user☆30Updated 4 years ago
- ☆51Updated 4 years ago
- ☆43Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆58Updated 3 years ago
- 用于Dump指定进程的内存,主要利用静默退出机制(SilentProcessExit)和Windows API(MiniDumpW)实现☆25Updated 3 years ago
- Beacon compiled using clang☆71Updated 2 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Updated 2 years ago
- [windows]pe -> shellcode -> shellcodeLoader -> (pe2shellcode go on?)☆78Updated 3 years ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated 2 years ago
- ReflectiveDLL学习代码☆35Updated 5 years ago
- Re-implement cmd.exe using windows api☆49Updated 2 years ago
- Use COM Component Bypass UAC,Dll Version☆36Updated 4 years ago
- DiagTrack Eop (From Service Account to SYSTEM)☆23Updated 2 years ago
- ☆74Updated 4 years ago
- enc8 密码碰撞脚本☆33Updated 2 years ago