dust-life / run_peLinks
☆50Updated 4 years ago
Alternatives and similar repositories for run_pe
Users that are interested in run_pe are comparing it to the libraries listed below
Sorting:
- UAC_wenpon☆49Updated 3 years ago
- CVE-2020-1472 C++☆83Updated 3 years ago
- cmd2shellcode☆79Updated 4 years ago
- Csharp 反射加载dll☆41Updated 4 years ago
- 自不量力的mimikatz分离计划☆44Updated 3 years ago
- ☆91Updated 4 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆88Updated 3 years ago
- creddump bypass AV☆42Updated 4 years ago
- [windows]pe -> shellcode -> shellcodeLoader -> (pe2shellcode go on?)☆78Updated 3 years ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆48Updated 3 years ago
- bypass BeaconEye☆88Updated 4 years ago
- 替代PrintBug用于本地提权的新方式,主要利用MS-EFSR协议中的接口函数 借鉴了Potitpotam中对 于EFSR协议的利用,实现了本地提权的一系列方式 Drawing on the use of the EFSR protocol in Potitpotam, …☆149Updated 3 years ago
- ☆46Updated 4 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆58Updated 3 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆21Updated 2 years ago
- Golang implementation of Reflective load PE from memory☆62Updated 3 years ago
- 调用x64dbg中的loadll.exe白加黑示例代码☆64Updated last year
- ReflectiveDLL学习代码☆35Updated 5 years ago
- ☆89Updated 3 years ago
- c++ shellcode loader☆40Updated 3 years ago
- C# shellcode runner adapted to run from a csproj to be triggered by MSBuild☆25Updated 3 years ago
- 记录一下我学习的Win32CPP☆55Updated last month
- MSSQL CLR for pentest.☆55Updated 2 years ago
- ReturnGate, just like HellsGate.☆68Updated 3 years ago
- ☆74Updated 4 years ago
- CrossC2通信协议API实现☆84Updated 4 years ago
- 通过WindowsAPI获取用户凭证,并保存到文件中☆194Updated last year
- ☆102Updated 2 years ago
- ReflectiveDLL☆156Updated 5 years ago
- This is learning to write windows 32 api instance code in the golang language☆40Updated 3 years ago