its-arun / CVE-2022-39197Links
CobaltStrike <= 4.7.1 RCE
☆386Updated 2 years ago
Alternatives and similar repositories for CVE-2022-39197
Users that are interested in CVE-2022-39197 are comparing it to the libraries listed below
Sorting:
- CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch.☆316Updated 2 years ago
- Modifying JuicyPotato to support load shellcode and webshell☆192Updated 3 years ago
- dump lsass进程工具☆552Updated last year
- Some demos to bypass EDRs or AVs by 78itsT3@m☆354Updated 2 years ago
- 使用多种WinAPI进行权限维持的CobaltStrike脚本,包含API设置系统服务,设置计划任务,管理用户等。☆543Updated 3 years ago
- ☆278Updated 3 months ago
- ☆338Updated 3 years ago
- 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化☆337Updated 3 years ago
- CobaltStrike beacon written in golang☆429Updated last year
- 域信息收集工具☆400Updated 2 years ago
- Burp插件,Malleable C2 Profiles生成器;可以通过Burp代理选中请求,生成Cobalt Strike的profile文件(CSprofile)☆279Updated 3 years ago
- 域内自动化信息搜集利用工具☆423Updated last year
- CVE-2021-21972 Exploit☆494Updated 2 years ago
- Redis-Attack By Replication (通过主从复制攻击Redis)☆340Updated 2 years ago
- 免杀版Neo-reGeorg☆262Updated 2 years ago
- 自己开的cs插件☆244Updated 2 years ago
- 个人整理的一些域渗透Tricks,可能有一些错误。☆254Updated 4 years ago
- ☆236Updated 2 years ago
- Syscall免杀☆508Updated last year
- 重构了Cobaltstrike Beacon,行为对国内主流杀软免杀,支持4.1以上的版本。 A cobaltstrike Beacon bypass anti-virus, supports 4.1+ version.☆311Updated 2 years ago
- 创建隐藏计划任务,权限维持,Bypass AV☆541Updated 3 years ago
- 远程shellcode加载&权限维持+小功能☆298Updated last year
- 基于 OPSEC 的 CobaltStrike 后渗透自动化链☆433Updated last year
- Memshell☆276Updated 3 years ago
- vhost password decrypt☆247Updated 8 months ago
- Msmap is a Memory WebShell Generator.☆583Updated 2 years ago
- 获取服务器或域控登录日志☆271Updated last year
- CrossC2 developed based on the Cobalt Strike framework can be used for other cross-platform system control. CrossC2Kit provides some inte…☆221Updated last year
- Exchange 服务器安全性的辅助测试工具☆327Updated last year
- dotnet 反序列化学习笔记☆462Updated last year