jbaines-r7 / blankspaceLinks
Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)
☆64Updated 3 years ago
Alternatives and similar repositories for blankspace
Users that are interested in blankspace are comparing it to the libraries listed below
Sorting:
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 3 years ago
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆60Updated 3 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Updated 4 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆84Updated 2 years ago
- Beacon Object Files.☆37Updated last year
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆61Updated 2 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆51Updated 3 years ago
- CVE-2019-1040 with Kerberos delegation☆34Updated 4 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆35Updated 4 years ago
- MacOS C2 Framework☆84Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- AutoStart teamserver and listeners with services☆74Updated 3 years ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Updated 2 years ago
- dump lsass tool☆38Updated 2 years ago
- Windows 7/2008 R2 EoP☆13Updated 4 years ago
- Terminate the eventlog thread to disable the windows eventlog☆21Updated 5 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 4 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- Read the contents of MS Word Documents using Cobalt Strike's Execute-Assembly☆117Updated 10 months ago
- POC from TestANull for CVE-2021-28482 on Exchange Server☆46Updated 4 years ago
- ☆18Updated 4 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆20Updated last year
- golang amsi bypass☆30Updated 3 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Updated 3 years ago
- Titan: A generic user defined reflective DLL for Cobalt Strike☆76Updated 2 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆34Updated 5 months ago