crisprss / Shellcode_Memory_Loader
基于Golang实现的Shellcode内存加载器,共实现3中内存加载shellcode方式,UUID加载,MAC加载和IPv4加载,目前能过主流杀软(包括Windows Defender)
☆253Updated 3 years ago
Alternatives and similar repositories for Shellcode_Memory_Loader:
Users that are interested in Shellcode_Memory_Loader are comparing it to the libraries listed below
- 远程shellcode加载&权限维持+小功能☆293Updated 10 months ago
- 将dll exe 等转成shellcode 最后输出exe 可定制加载器模板 支持白文件的捆绑 shellcode 加密☆362Updated 2 years ago
- EDR绕过demo☆290Updated last year
- 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化☆333Updated 2 years ago
- 自己开的cs插件☆243Updated 2 years ago
- 内网渗透|红队工具|C#内存加载|cobaltstrike☆294Updated 2 years ago
- 一款可以过国内所有杀软可以过云查杀的shellcode loader☆146Updated 2 years ago
- Burp插件,Malleable C2 Profiles生成器;可以通过Burp代理选中请求,生成Cobalt Strike的profile文件(CSprofile)☆274Updated 3 years ago
- nim一键免杀☆214Updated 4 years ago
- 域信息收集工具☆391Updated 2 years ago
- asp.net内存马检测工具☆269Updated last year
- 使用多种WinAPI进行权限维持的CobaltStrike脚本,包含API设置系统服务,设置计划任务,管理用户等。☆540Updated 3 years ago
- AvHunt-杀毒软件识别☆173Updated 2 years ago
- Java内存马注入工具☆245Updated last year
- ☆336Updated 2 years ago
- RPC远程主机信息匿名扫描工具☆314Updated 2 years ago
- 重构了Cobaltstrike Beacon,行为对国内主流杀软免杀,支持4.1以上的版本。 A cobaltstrike Beacon bypass anti-virus, supports 4.1+ version.☆297Updated 2 years ago
- Modifying JuicyPotato to support load shellcode and webshell☆189Updated 3 years ago
- Some demos to bypass EDRs or AVs by 78itsT3@m☆350Updated 2 years ago
- 域内自动化信息搜集利用工具☆420Updated last year
- Exchange 服务器安全性的辅助测试工具☆323Updated last year
- 敌后侦察☆232Updated 2 years ago
- useful-code☆177Updated last year
- python写的一款免杀工具(shellcode加载器)BypassAV,国内杀软全过(windows denfend)2021-9-13☆271Updated 5 months ago
- 获取服务器或域控登录日志☆270Updated last year
- X系列安全工具-AV免杀框架-BypassAV☆205Updated 2 years ago
- Mssql利用工具☆263Updated last year
- 基于 OPSEC 的 CobaltStrike 后渗透自 动化链☆424Updated last year
- CobaltStrike 上线自动权限维持插件☆183Updated 3 years ago
- 通过生成不同hash的ico并写入程序中,实现批量bypass360QVM☆231Updated last year