ldsaiyan / EventLogPersistLinks
A Simple Proof Code for Extracting and Executing Shellcode from Event Logs
☆27Updated 2 years ago
Alternatives and similar repositories for EventLogPersist
Users that are interested in EventLogPersist are comparing it to the libraries listed below
Sorting:
- kill windows log☆45Updated last year
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆44Updated 2 years ago
- CobaltStrike Malleable Profile☆23Updated 3 years ago
- CrackMapExec extension module/protocol support☆42Updated last year
- resource-based constrained delegation RBCD☆45Updated 3 years ago
- CobaltStrike and Google Auth twice☆65Updated 3 years ago
- 轻便的恶意反代☆48Updated 4 years ago
- Windows & linux Echo to file command converter☆25Updated 4 years ago
- cobaltstrike免杀插件☆22Updated 3 years ago
- ☆101Updated 2 years ago
- 去除了流量特征的UDP协议跨平台机器管理工具☆37Updated 4 years ago
- 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。☆33Updated 3 years ago
- sliver-webhook 实现上线通知☆25Updated 2 years ago
- Search msDS-AllowedToActOnBehalfOfOtherIdentity☆35Updated 3 years ago
- 解析netsh抓取的etl文件来定位windows主机上存在ICMP通信的进程与文件的小工具☆31Updated 3 years ago
- 7bits安全团队-《Java安全-记一次实战使用memoryshell》代码样例☆19Updated 2 years ago
- 窃取当前用户的ssh,sudo密码☆69Updated 2 years ago
- 为了修复XSS RCE的同时提供其他功能聚合而成的cs agent☆5Updated 2 years ago
- 一个基于DNS隧道的简单C2☆59Updated 3 years ago
- MS17-010 Exploits With Original NSA Tool(only for windows)☆30Updated last year
- ☆33Updated 2 years ago
- ☆15Updated 2 years ago
- c/s网络准入平台☆20Updated 2 years ago
- ad vulnerability scanner☆72Updated last year
- Lsass memory dump.☆53Updated last year
- 🗽 基于Socket RAW,利用 NTLMSSP 探测 Windows远程主机信息☆50Updated 2 years ago
- 免杀shellcode☆14Updated 3 years ago
- 通过RPC创建计划任务☆19Updated 2 months ago
- CrossC2通信协议API实现☆84Updated 4 years ago
- badusb联动cobaltrstrike近源攻击☆26Updated 3 years ago