ro0tmylove / CVE-2024-35250-BOFLinks
Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。)
☆15Updated last year
Alternatives and similar repositories for CVE-2024-35250-BOF
Users that are interested in CVE-2024-35250-BOF are comparing it to the libraries listed below
Sorting:
- Detect Beacon Powerful (Include CobatStrike 4.10 Aha~)☆21Updated last year
- Winsocket for Cobalt Strike.☆100Updated 2 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆35Updated 7 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆59Updated 8 months ago
- CobaltStrike beacon written in golang☆27Updated 2 years ago
- WSUS Unauthenticated RCE☆55Updated last week
- CVE-2024-40711-exp☆42Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆178Updated 2 months ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆46Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 3 years ago
- ☆57Updated last year
- ☆67Updated 2 years ago
- AV/EDR killer using BYOVD technique☆37Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆85Updated 2 years ago
- ☆16Updated 2 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 3 years ago
- A Simple PoC☆21Updated last year
- ownCloud exploits for CVE-2023-49105☆36Updated last year
- Help red teams find opsec processes during engagements☆43Updated 10 months ago
- Beacon Object Files.☆37Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Updated 2 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Updated 3 years ago
- Beacon Object File (BOF) Template☆58Updated 11 months ago
- dump lsass tool☆38Updated 3 years ago
- ☆41Updated 2 years ago
- Groovy Post Exploitation☆19Updated last year
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆40Updated 3 months ago
- Silently Install Chrome Extension For Persistence☆92Updated last year
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆61Updated 2 years ago
- ☆81Updated last year