hanc00l / jscat
JScript RAT
☆99Updated 3 years ago
Related projects: ⓘ
- proxylogon exploit - CVE-2021-26857☆113Updated 3 years ago
- generate CobaltStrike's cross-platform payload☆33Updated 3 months ago
- ShellCode Loader for MSF and Cobalt Strike☆54Updated 4 months ago
- dll proxying☆52Updated 3 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆34Updated 4 years ago
- just test☆65Updated last year
- Dumping Windows Local Credentials Tools/Tricks☆66Updated 4 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆135Updated 4 years ago
- a patched sshd for red team activities☆81Updated 3 years ago
- ☆93Updated 3 years ago
- ☆55Updated this week
- Exchange2010 authorized RCE☆154Updated 3 years ago
- proxyshell payload generate☆72Updated 3 years ago
- Bypass cobaltstrike beacon config scan☆84Updated 3 years ago
- ☆88Updated this week
- Cobalt Strike AggressorScripts CVE-2020-0796☆78Updated 4 years ago
- ☆57Updated this week
- Just pick out the code we need.☆57Updated 4 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 3 years ago
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆161Updated 4 years ago
- ☆159Updated this week
- Cobalt Strike Team Server Password Brute Forcer☆28Updated 4 years ago
- Command and Control for C# Writing☆69Updated last year
- Cobalt Strike Aggressor Scripts☆69Updated 4 years ago
- 使得Cobaltstrike支持Atexec☆87Updated 4 years ago
- Security Support Provider Interface☆45Updated 4 years ago
- Play Doh Windows ACL Tools☆60Updated 2 years ago
- CVE-2021-26855 & CVE-2021-27065☆26Updated 3 years ago
- 破解CS4.0☆159Updated 4 years ago