dev-frog / C-Reverse-ShellLinks
a simple c++ reverse shell for windows
☆114Updated 5 years ago
Alternatives and similar repositories for C-Reverse-Shell
Users that are interested in C-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- Manipulating and Abusing Windows Access Tokens.☆287Updated 5 years ago
- C implementation of the file-less UAC exploit☆74Updated 9 years ago
- Bypass AMSI by patching AmsiScanBuffer☆278Updated 4 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆202Updated 6 months ago
- Malicious Shortcut(.lnk) Generator☆86Updated 7 years ago
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆202Updated 5 years ago
- Simple reverse shell to avoid Win 11 defender detection☆122Updated 4 years ago
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆160Updated 7 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆90Updated 5 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆249Updated 5 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆39Updated 8 years ago
- ☆161Updated 4 months ago
- OSCP Cheatsheets☆99Updated 6 years ago
- Weaponizing for privileged file writes bugs with windows problem reporting☆244Updated 3 years ago
- Malicious Shortcut(.lnk) Generator☆200Updated 7 years ago
- The program is designed to obfuscate the shellcode.☆203Updated 4 years ago
- ☆362Updated 4 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆458Updated 4 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆312Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- ☆237Updated 8 years ago
- A User Impersonation tool - via Token or Shellcode injection☆421Updated 3 years ago
- Dll that can be used for side loading and other attack vector.☆203Updated 5 years ago
- Dump stuff without touching disk☆164Updated 5 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆146Updated 4 years ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆173Updated 10 months ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆143Updated 4 years ago
- Bring your own print driver privilege escalation tool☆259Updated 4 years ago
- Impersonating authentication over HTTP and/or named pipes.☆144Updated 4 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆158Updated 5 years ago