m0n73 / vexLinks
vex - an asynchronous reverse connection helper for SOCKS4/5 proxies.
☆17Updated 5 years ago
Alternatives and similar repositories for vex
Users that are interested in vex are comparing it to the libraries listed below
Sorting:
- Windows NTLM Authentication Backdoor☆241Updated 10 months ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆114Updated 2 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Updated 5 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆107Updated 5 years ago
- Encrypting shellcode to Bypass AV☆71Updated 6 years ago
- C# program to take a full size screenshot or a recording of the user's desktop. Takes in 0-3 flags☆85Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- C# binary with embeded golang hack-browser-data☆99Updated 3 years ago
- AutoStart teamserver and listeners with services☆75Updated 3 years ago
- reverse socks tunneler with ntlm and proxy support☆60Updated 3 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆49Updated 4 years ago
- MappingInjection via csharp☆40Updated 4 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Updated 4 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆38Updated 5 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆92Updated 2 months ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆51Updated 3 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 4 years ago
- proxy your C2 traffic through CDN using websocket☆53Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆94Updated 4 years ago
- 该项目为Shellocde加载器,详细介绍了我们如何绕过防病毒软件,以及该工具如何使用☆22Updated 3 years ago
- Reflective DLL Injection with obfuscated (XOR) shellcode☆73Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 6 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 3 years ago
- NanoCore rat stub source code☆39Updated 3 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆10Updated 3 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 4 years ago
- Windows Defender ShellCode Execution Bypass☆129Updated 6 years ago
- Windows Defender Bypass for Cobalt Strike v4.0 Powershell Payload☆10Updated 5 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Updated 4 years ago
- PoC for UUID shellcode execution using DInvoke☆156Updated 4 years ago