mstxq17 / CVE-2021-1675_RDL_LPEView external linksLinks
PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。
☆148Sep 1, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2021-1675_RDL_LPE
Users that are interested in CVE-2021-1675_RDL_LPE are comparing it to the libraries listed below
Sorting:
- 提取DC日志,快速获取域 用户对应IP地址☆308Mar 21, 2022Updated 3 years ago
- SpringBoot Actuator未授权自动化利用,支持信息泄漏/RCE☆232Dec 5, 2020Updated 5 years ago
- 创建隐藏计划任务,权限维持,Bypass AV☆556Sep 1, 2021Updated 4 years ago
- 一个能快速开启和关闭匿名SMB共享的红队脚本☆174Apr 6, 2022Updated 3 years ago
- Memshell☆292Dec 7, 2021Updated 4 years ago
- CVE-2021-36798: CobaltStrike < 4.4 Dos☆103Sep 26, 2021Updated 4 years ago
- Windows活动目录中的LDAP信息收集工具☆234Oct 9, 2021Updated 4 years ago
- CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能☆731Sep 1, 2021Updated 4 years ago
- CrossC2通信协议API实现☆84Jul 26, 2021Updated 4 years ago
- 红队行动中利用白利用、免杀、自动判断网络环境生成钓鱼可执行文件。☆366Jun 19, 2024Updated last year
- CVE-2021-3156非交互式执行命令☆203Feb 9, 2021Updated 5 years ago
- 使用多种WinAPI进行权限维持的CobaltStrike脚本,包含API设置系统服务,设置计划任务,管理用户等。☆556Jan 18, 2022Updated 4 years ago
- ZipCreater主要应用于跨目录的文件上传漏洞的利用,它能够快速进行压缩包生成。☆187Apr 6, 2022Updated 3 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆246Apr 30, 2020Updated 5 years ago
- Cobalt Strike AggressorScripts CVE-2020-0796☆78Sep 9, 2020Updated 5 years ago
- 检测域环境内,域机器的本地管理组成员是否存在弱口令和通用口令,对域用户的权限分配以及域内委派查询☆355Aug 10, 2021Updated 4 years ago
- 防火墙出网探测工具,内网穿透型socks5代理☆270Nov 12, 2021Updated 4 years ago
- 一款可以在不出网的环境下进行反向代理及cs上线的工具☆491Apr 26, 2023Updated 2 years ago
- 影子用户 克隆☆232Dec 30, 2021Updated 4 years ago
- 获取Exchange信息的小工具☆232Oct 26, 2023Updated 2 years ago
- X系列安全工具-AV免杀框架-BypassAV☆207Oct 6, 2022Updated 3 years ago
- bypass BeaconEye☆89Sep 9, 2021Updated 4 years ago
- 自己开的cs插件☆248Feb 10, 2023Updated 3 years ago
- Go实现部分Rubeus功能,可执行asktgt, asktgs, s4u, describe ticket, renew ticket, asreproast等☆142May 5, 2022Updated 3 years ago
- C# 读取本机对外RDP连接记录和其他主机对该主机的连接记录,从而在内网渗透中获取更多可通内网网段信息以及定位运维管理人员主机☆431Jan 28, 2021Updated 5 years ago
- cobaltstrike插件☆182Mar 11, 2021Updated 4 years ago
- js免杀shellcode,绕过杀毒添加自启☆356Mar 16, 2021Updated 4 years ago
- ☆342Jun 7, 2022Updated 3 years ago
- 可在Windows下执行系统命令的Redis模块,可用于Redis主从复制攻击。☆264Nov 25, 2022Updated 3 years ago
- AntSword(蚁剑)全参数流量XOR和Base64加伪装WebShell☆163Sep 28, 2021Updated 4 years ago
- 适用于Cobalt Strike的插件☆562May 30, 2021Updated 4 years ago
- JumpServer远程代码执行漏洞检测利用脚本☆202Feb 9, 2021Updated 5 years ago
- 宝塔面板Windows版提权方法☆325Jan 26, 2021Updated 5 years ago
- nim一键免杀☆215Mar 8, 2021Updated 4 years ago
- Cobalt Strike Aggressor 插件包☆672Aug 31, 2021Updated 4 years ago
- 一个cobaltstrike shellcode加载器,过国内主流杀软☆124May 21, 2021Updated 4 years ago
- 免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器☆676Feb 11, 2026Updated last week
- openam-CVE-2021-35464 tomcat 执行命令回显☆87Dec 15, 2022Updated 3 years ago
- ☆74Jul 23, 2021Updated 4 years ago