dev-frog / C-Reverse-ShellLinks
a simple c++ reverse shell for windows
☆113Updated 5 years ago
Alternatives and similar repositories for C-Reverse-Shell
Users that are interested in C-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- C implementation of the file-less UAC exploit☆74Updated 9 years ago
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆199Updated 5 years ago
- Manipulating and Abusing Windows Access Tokens.☆283Updated 4 years ago
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆150Updated 7 years ago
- The program is designed to obfuscate the shellcode.☆203Updated 4 years ago
- Bypass AMSI by patching AmsiScanBuffer☆273Updated 4 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆90Updated 5 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆40Updated 8 years ago
- ☆153Updated last month
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆143Updated 4 years ago
- Simple reverse shell to avoid Win 11 defender detection☆121Updated 3 years ago
- Malicious Shortcut(.lnk) Generator☆85Updated 6 years ago
- Malicious Shortcut(.lnk) Generator☆197Updated 6 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆458Updated 3 years ago
- Dll that can be used for side loading and other attack vector.☆202Updated 5 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆194Updated 2 months ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆432Updated 3 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆247Updated 5 years ago
- Weaponizing for privileged file writes bugs with windows problem reporting☆237Updated 3 years ago
- ☆363Updated 4 years ago
- Impersonating authentication over HTTP and/or named pipes.☆139Updated 4 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆96Updated 2 years ago
- A collection of C# shellcode injection techniques. All techniques use an AES encrypted meterpreter payload. I will be building this proje…☆460Updated 3 years ago
- Scripts created to help with post exploitation of a Windows host☆99Updated 4 years ago
- OSCP Cheatsheets☆98Updated 6 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆146Updated 4 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Updated 5 years ago
- Bypass for PowerShell Constrained Language Mode☆400Updated 3 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆312Updated 4 years ago
- Run Rubeus via Rundll32☆200Updated 5 years ago