lazaars / UltraRealy_with_CVE-2019-1040
Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit
☆20Updated 5 years ago
Related projects: ⓘ
- ☆17Updated this week
- couchdb remote command exec.☆14Updated 6 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆10Updated 4 years ago
- AppLocker Bypass With Regasm/InstallUtil☆23Updated 5 years ago
- inject shellcode into remote process via message hook☆15Updated 3 years ago
- ☆12Updated this week
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Updated 5 years ago
- Loads shellcode from a resource file.☆21Updated 5 years ago
- ☆12Updated this week
- BlowBeef is a tool for analyzing WMI data.☆18Updated 3 years ago
- Source code RDPUploader☆18Updated 5 years ago
- ☆22Updated this week
- PhishReportCS is a penetration testing and red teaming tool that automates the phishing campaign reporting process for Cobalt Strike phis…☆8Updated 5 years ago
- A collection of useful aggressor scripts. All credits due to its authors.☆12Updated 5 years ago
- ☆36Updated 4 years ago
- ☆12Updated this week
- Show AV Processes list☆14Updated 3 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆13Updated 5 years ago
- ☆20Updated this week
- alternative to procdump☆9Updated 3 years ago
- Antivirus Process List☆15Updated 5 years ago
- ☆34Updated this week
- ☆35Updated 4 years ago
- CVE-2019-1040 with Kerberos delegation☆32Updated 3 years ago
- StenographyShellcodeLoader☆42Updated 4 years ago
- cobalt strike 自用脚本☆27Updated 3 years ago
- Use current thread token to execute command☆15Updated 3 years ago
- ☆13Updated this week
- Cobalt Strike Aggressor Scripts are custom penetration testing and red teaming scripts for use with Cobalt Strike.☆8Updated 5 years ago
- Windows 7/2008 R2 EoP☆13Updated 3 years ago