dev-frog / C-Reverse-ShellLinks
a simple c++ reverse shell for windows
☆113Updated 5 years ago
Alternatives and similar repositories for C-Reverse-Shell
Users that are interested in C-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- C implementation of the file-less UAC exploit☆74Updated 9 years ago
- Bypass AMSI by patching AmsiScanBuffer☆275Updated 4 years ago
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆155Updated 7 years ago
- OSCP Cheatsheets☆98Updated 6 years ago
- Manipulating and Abusing Windows Access Tokens.☆289Updated 4 years ago
- Simple reverse shell to avoid Win 11 defender detection☆122Updated 3 years ago
- Malicious Shortcut(.lnk) Generator☆86Updated 7 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆90Updated 5 years ago
- Malicious Shortcut(.lnk) Generator☆198Updated 7 years ago
- The program is designed to obfuscate the shellcode.☆202Updated 4 years ago
- ☆157Updated 2 months ago
- Dll that can be used for side loading and other attack vector.☆203Updated 5 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆39Updated 8 years ago
- Impersonating authentication over HTTP and/or named pipes.☆139Updated 4 years ago
- ☆364Updated 4 years ago
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆199Updated 5 years ago
- Weaponizing for privileged file writes bugs with windows problem reporting☆239Updated 3 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆249Updated 5 years ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆173Updated 8 months ago
- Ultimate File Transfer List☆66Updated 3 years ago
- Dump stuff without touching disk☆164Updated 5 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆157Updated 5 years ago
- Simple APPLocker bypass summary☆47Updated 7 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆433Updated 3 years ago
- CyberSec Blog☆97Updated last month
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆199Updated 3 months ago
- A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload. I will be building this proje…☆463Updated 4 years ago
- Scripts created to help with post exploitation of a Windows host☆99Updated 4 years ago