demonsec666 / muddyc3_golang
muddyc3_golang
☆21Updated 5 years ago
Alternatives and similar repositories for muddyc3_golang:
Users that are interested in muddyc3_golang are comparing it to the libraries listed below
- backdoor c2☆38Updated 5 years ago
- StenographyShellcodeLoader☆42Updated 4 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- ☆13Updated 3 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆64Updated 8 months ago
- RDI implementation in Nim☆63Updated 4 years ago
- CVE-2021-1675 (PrintNightmare)☆75Updated 3 years ago
- CVE-2021-21972☆32Updated 4 years ago
- Terminate the eventlog thread to disable the windows eventlog☆20Updated 5 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- WinrmCmd/WinrmShell ( Golang\PowerShell\Python)☆33Updated 4 years ago
- ☆37Updated 7 years ago
- ☆10Updated 4 years ago
- SharpDir is a simple code set to search both local and remote file systems for files and is compatible with Cobalt Strike.☆26Updated 5 years ago
- A simple hidden vnc.☆32Updated 4 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆37Updated 2 years ago
- ☆51Updated 5 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆58Updated 3 years ago
- desktop screenshot☆29Updated last year
- C# loader for msfvenom shellcode with AMSI bypass☆34Updated 4 years ago
- SharpAddDomainMachine☆67Updated 3 years ago
- Load the evilDLL from socket connection without touch disk☆16Updated 3 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆47Updated 3 years ago
- ☆36Updated 4 years ago
- Windows Persistence Collection☆12Updated 4 years ago
- Windows 7/2008 R2 EoP☆13Updated 4 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- ☆19Updated 4 years ago