evilashz / Visual-Studio-BOF-template
more conveniently Visual-Studio-BOF-template
☆58Updated last year
Alternatives and similar repositories for Visual-Studio-BOF-template:
Users that are interested in Visual-Studio-BOF-template are comparing it to the libraries listed below
- Binary Hollowing☆69Updated 5 months ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆67Updated 2 years ago
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆71Updated last year
- Shellcode Reductio Entropy Tools☆64Updated last year
- vehsyscall:a syscall project that may bypass EDR☆54Updated 11 months ago
- Silently Install Chrome Extension For Persistence☆48Updated 7 months ago
- Bypass EDR Create TaskServers☆36Updated 2 years ago
- Cobalt Strike BOF that Add a user to localgroup by samr☆126Updated 2 years ago
- ☆39Updated last year
- impacket编程手册☆102Updated last year
- ☆91Updated 3 years ago
- Self Cleanup in post-ex job☆48Updated 5 months ago
- command execute without 445 port☆52Updated 2 years ago
- ☆48Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆41Updated 9 months ago
- MSSQL CLR for pentest.☆54Updated last year
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆30Updated 2 years ago
- A Blind EDR Project for Educational Purposes☆18Updated last month
- Red team tool designed for quickly identifying hijackable programs, evading antivirus software, and EDR (Endpoint Detection and Response)…☆63Updated 9 months ago
- CVE-2020-1472 C++☆81Updated 2 years ago
- Beacon compiled using clang☆63Updated 2 years ago
- Delete file regardless of whether the handle is used via SetFileInformationByHandle☆41Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆39Updated last year
- ☆49Updated last year
- C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can…☆16Updated 3 years ago
- ReturnGate, just like HellsGate.☆66Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- 一个demo☆23Updated 10 months ago
- ☆31Updated last year
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆87Updated last year