iss4cf0ng / DuplexSpyCS
Remote Access Tool written in C#
☆29Updated 3 weeks ago
Alternatives and similar repositories for DuplexSpyCS
Users that are interested in DuplexSpyCS are comparing it to the libraries listed below
Sorting:
- Help red teams find opsec processes during engagements☆40Updated 5 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆48Updated 2 months ago
- A Simple PoC☆21Updated 11 months ago
- ☆47Updated last year
- Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellco…☆39Updated 7 months ago
- Self Cleanup in post-ex job☆55Updated 8 months ago
- A mutliple tactics to execute shellcode in go :}☆18Updated 3 weeks ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆23Updated 11 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆45Updated 2 years ago
- Kill Everything AV/EDR☆26Updated 5 months ago
- replace the shellcode chatacters so that reduce the entropy☆17Updated last year
- Efficient RAT signature locator for bypassing AV/EDR, supporting static scanning and memory scanning.☆42Updated 6 months ago
- 一个普通的BOF用来BypassUAC☆22Updated last year
- Silently Install Chrome Extension For Persistence☆51Updated 9 months ago
- ☆26Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆16Updated last year
- A BOF/COFF loader implemented in Go and CGO.☆22Updated last year
- AdaptixFramework Extension Kit☆77Updated 2 weeks ago
- ☆23Updated 3 weeks ago
- BypassCredGuard CS BOF☆38Updated 3 months ago
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆39Updated 9 months ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆45Updated last year
- CVE-2023-21707 EXP☆28Updated last year
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆32Updated 2 years ago
- ☆40Updated last year
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆30Updated 3 weeks ago
- ☆57Updated 10 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆42Updated last year
- More EFS coerced authentication method with PetitPotam.py☆23Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆59Updated last year