kyxiaxiang / 360WFP_ExploitView external linksLinks
BYOVD: Use 360 WFP driver to block EDR/XDR network connection.
☆41Updated this week
Alternatives and similar repositories for 360WFP_Exploit
Users that are interested in 360WFP_Exploit are comparing it to the libraries listed below
Sorting:
- ☆18Aug 15, 2025Updated 5 months ago
- DiagTrack Eop (From Service Account to SYSTEM)☆24Jan 13, 2023Updated 3 years ago
- IDA Plugin exports all pseudocode at once for easy search and analysis☆21Jan 27, 2026Updated 2 weeks ago
- 非常简单的CVE-2023-0386's exp and analysis.Use c and sh.☆19Jun 28, 2023Updated 2 years ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 6 months ago
- ☆51Aug 23, 2022Updated 3 years ago
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- NSecSoftBYOVD POC☆54Sep 14, 2025Updated 4 months ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 7 months ago
- Go 代码混淆工具,使用 AST (抽象语法树) 技术实现跨文件的代码混淆,同时保证混淆后的代码可编译和可执行。☆171Nov 20, 2025Updated 2 months ago
- ☆37Jan 4, 2026Updated last month
- 一种通过进程注入实现强制关闭部分杀软进程的方法(以360安全卫士和360杀毒为例)☆138Dec 26, 2023Updated 2 years ago
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆161Oct 27, 2024Updated last year
- Dependencies with Log4j2 Checklist☆35Dec 14, 2021Updated 4 years ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Jun 9, 2023Updated 2 years ago
- 宏景ehr sql注入的tamper脚本(sqlmap使用)☆36Jun 14, 2023Updated 2 years ago
- kernel exploit☆10Jan 14, 2025Updated last year
- Beacon Object Files (BOFs) for Cobalt Strike and Havoc C2. Implementations of Active Directory attacks and post-exploitation techniques.☆99Jan 26, 2026Updated 2 weeks ago
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.☆178Dec 23, 2025Updated last month
- 一个2020年练手的基于gin框架搞的在线免杀平台,支持后台管理,邀请码注册等☆39Sep 12, 2024Updated last year
- Make "upx -d" unpacking impossible!☆174May 21, 2025Updated 8 months ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Managing VPC and EC2 Infrastructure with Python and Boto3☆12May 6, 2018Updated 7 years ago
- 鉴穹日志安全分析系统☆18Sep 7, 2025Updated 5 months ago
- webshell编码工具 支持 jsp net php asp编码免杀☆26Dec 16, 2025Updated last month
- BYOVD Technique Example using viragt64 driver☆68Jul 25, 2024Updated last year
- Interactive python script for exploiting WPS on access points. Works well with Kali 2.0. (Disclaimer: I'm not responsible for any illeg…☆10Sep 25, 2016Updated 9 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Feb 13, 2017Updated 9 years ago
- MuddyWater C2 framework research☆12Jun 28, 2023Updated 2 years ago
- 复现K360☆14Apr 5, 2025Updated 10 months ago
- ☆14Sep 30, 2022Updated 3 years ago
- ☆20Jan 15, 2025Updated last year
- This's a translation edition of Beej's Guide Network Programming in Chinese which translated by Michael Yuanyuan☆14Apr 15, 2013Updated 12 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- AiCSA,Move to https://github.com/hktalent/AiCSA☆10Apr 3, 2023Updated 2 years ago
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 5 years ago
- Three different shellcode techniques on the Windows Kernel☆15Apr 8, 2025Updated 10 months ago
- EFCHSword是一款驱动级计算机管理软件,具有 进程管理 窗口管理 文件管理 自启动管理 服务管理 进程行为监视 注册表管理 等功能☆15Jan 30, 2026Updated 2 weeks ago