ldsaiyan / EventLogPersistLinks
A Simple Proof Code for Extracting and Executing Shellcode from Event Logs
☆27Updated 2 years ago
Alternatives and similar repositories for EventLogPersist
Users that are interested in EventLogPersist are comparing it to the libraries listed below
Sorting:
- CrackMapExec extension module/protocol support☆42Updated last year
- kill windows log☆45Updated last year
- Asset scanning by dictionary stitching Domain to identify Exchange Servers versions☆44Updated 2 years ago
- CobaltStrike Malleable Profile☆23Updated 3 years ago
- ☆11Updated last month
- 🗽 基于Socket RAW,利用 NTLMSSP 探测 Windows远程主机信息☆50Updated 2 years ago
- 轻便的恶意反代☆48Updated 4 years ago
- resource-based constrained delegation RBCD☆45Updated 3 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆58Updated 3 years ago
- cobaltstrike免杀插件☆23Updated 3 years ago
- 去除了流量特征的UDP协议跨平台机器管理工具☆39Updated 4 years ago
- ☆46Updated last year
- CobaltStrike and Google Auth twice☆64Updated 3 years ago
- 一个基于DNS隧道的简单C2☆59Updated 3 years ago
- 在权限足够的情况下弹出system权限的cmd命令行,包含exe和dll两种文件类型,可用于一些可能存在本地提权漏洞的测试。☆33Updated 3 years ago
- ☆15Updated 2 years ago
- Search msDS-AllowedToActOnBehalfOfOtherIdentity☆35Updated 3 years ago
- ☆102Updated 2 years ago
- RPC 调用添加ssp扩展dump lsass☆19Updated 3 years ago
- MSSQL CLR for pentest.☆54Updated 2 years ago
- MS17-010 Exploits With Original NSA Tool(only for windows)☆31Updated last year
- badusb联动cobaltrstrike近源攻击☆26Updated 4 years ago
- Bloodhound 数据解析工具☆22Updated 2 months ago
- dump lsass☆37Updated 3 years ago
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user; Adding the sam_the_admin_maq when MachineAccoun…☆22Updated last year
- ☆27Updated 4 years ago
- SystemGap - Maintenance Tools after privilege escalation☆41Updated last year
- ☆15Updated last year
- Cobalt Strike RCE CVE-2022-39197☆17Updated 2 years ago
- Lsass memory dump.☆53Updated last year