iyandi / js-shellcode
js加载cs的shellcode,实现免杀
☆9Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for js-shellcode
- CrackMapExec extension module/protocol support☆41Updated last year
- ☆15Updated last year
- ☆22Updated 2 years ago
- ☆44Updated 3 years ago
- cobaltstrike免杀插件☆21Updated 2 years ago
- dump lsass☆36Updated 2 years ago
- ☆29Updated last year
- 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。☆32Updated 2 years ago
- Bypass EDR Create TaskServers☆34Updated last year
- geacon for apt profile☆21Updated 2 years ago
- shellcode loader by c++,免杀,bypass,☆13Updated 2 years ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆19Updated last year
- Invoke-Obfuscation-Bypass + PS2EXE 过主流杀软☆52Updated 3 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 2 years ago
- MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability☆18Updated 3 years ago
- 利用RPC服务,内网批量探测Windows出网☆14Updated 2 years ago
- Enable RDP and set firewall by Windows API.☆19Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆38Updated last year
- RPC 调用添加ssp扩展dump lsass☆15Updated 2 years ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching .☆32Updated last year
- cmd2shellcode☆78Updated 3 years ago
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆67Updated last year
- AddDefenderExclusions Beacon Object File☆31Updated last year
- CobaltStrike Malleable Profile☆23Updated 2 years ago
- Call the CLR interface from memory to load powershell, process-less powershell☆12Updated last year
- resource-based constrained delegation RBCD☆43Updated 2 years ago
- desktop screenshot☆29Updated last year