ldsaiyan / EventLogPersist
A Simple Proof Code for Extracting and Executing Shellcode from Event Logs
☆27Updated last year
Related projects ⓘ
Alternatives and complementary repositories for EventLogPersist
- Windows & linux Echo to file command converter☆23Updated 3 years ago
- 去除了流量特征的UDP协议跨平台机器管理工具☆36Updated 3 years ago
- 一个简单的指纹识别小工具☆20Updated last year
- resource-based constrained delegation RBCD☆43Updated 2 years ago
- CobaltStrike Malleable Profile☆23Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- ☆34Updated 2 years ago
- ☆45Updated 4 months ago
- Automatically parse Malleable C2 profiled into CrossC2 rebinding library source code☆19Updated last year
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆44Updated last year
- Cobalt Strike RCE CVE-2022-39197☆17Updated 2 years ago
- ☆21Updated 2 years ago
- CrackMapExec extension module/protocol support☆40Updated last year
- cobaltstrike免杀插件☆21Updated 2 years ago
- 7bits安全团队-《Java安全-记一次实战使用memoryshell》代码样例☆17Updated last year
- dump lsass☆36Updated 2 years ago
- Goal Go Red-Team 工具类☆42Updated last year
- Invoke-Obfuscation-Bypass + PS2EXE 过主流杀软☆52Updated 3 years ago
- cmd2shellcode☆78Updated 3 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆45Updated 3 years ago
- Exchange ProxyRelay POC☆36Updated 2 years ago
- This is learning to write windows 32 api instance code in the golang language☆38Updated 2 years ago
- ☆15Updated last year
- command execute without 445 port☆51Updated 2 years ago
- kill windows log☆45Updated 7 months ago
- Really stupid re-implementation of invoke-wmiexec☆13Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆59Updated 2 years ago
- sliver-webhook 实现上线通知☆23Updated last year