ldsaiyan / EventLogPersistLinks
A Simple Proof Code for Extracting and Executing Shellcode from Event Logs
☆27Updated 2 years ago
Alternatives and similar repositories for EventLogPersist
Users that are interested in EventLogPersist are comparing it to the libraries listed below
Sorting:
- kill windows log☆45Updated last year
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆44Updated 2 years ago
- 去除了流量特征的UDP协议跨平台机器管理工具☆40Updated 4 years ago
- CobaltStrike Malleable Profile☆23Updated 3 years ago
- 轻便的恶意反代☆48Updated 4 years ago
- 一个基于DNS隧道的简单C2☆59Updated 3 years ago
- 🗽 基于Socket RAW,利用 NTLMSSP 探测 Windows远程主机信息☆50Updated 2 years ago
- CrackMapExec extension module/protocol support☆41Updated 2 years ago
- 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。☆33Updated 3 years ago
- Windows & linux Echo to file command converter☆25Updated 4 years ago
- dump lsass☆37Updated 3 years ago
- ☆102Updated 3 years ago
- 窃取当前用户的ssh,sudo密码☆69Updated 2 years ago
- 密码收集☆58Updated 3 years ago
- ☆11Updated 2 months ago
- CobaltStrike and Google Auth twice☆64Updated 3 years ago
- sliver-webhook 实现上线通知☆26Updated 2 years ago
- a 'pentest' udf plugin of MySQL.☆36Updated 3 years ago
- MS17-010 Exploits With Original NSA Tool(only for windows)☆31Updated last year
- ad vulnerability scanner☆73Updated last year
- RPC 调用添加ssp扩展dump lsass☆19Updated 3 years ago
- ☆40Updated last year
- cobaltstrike免杀插件☆23Updated 3 years ago
- portreuse reuseport 端口复用☆62Updated 2 years ago
- badusb联动cobaltrstrike近源攻击☆26Updated 4 years ago
- CobaltStrike profile by 风起☆37Updated 3 years ago
- ☆33Updated 3 years ago
- c/s网络准入平台☆20Updated 2 years ago
- ☆15Updated 2 years ago
- Bloodhound 数据解析工具☆22Updated 3 months ago