senzee1984 / Windows_x64_Tcp_Reverse_Shell_ShellcodeLinks
Null-free shellcode for TCP reverse shell on Windows x64
☆57Updated last year
Alternatives and similar repositories for Windows_x64_Tcp_Reverse_Shell_Shellcode
Users that are interested in Windows_x64_Tcp_Reverse_Shell_Shellcode are comparing it to the libraries listed below
Sorting:
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆121Updated 2 years ago
- Terminate AV/EDR leveraging BYOVD attack☆89Updated 4 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆160Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆106Updated 3 weeks ago
- ☆124Updated last year
- ApexLdr is a DLL Payload Loader written in C☆111Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆79Updated 2 years ago
- Threadless shellcode injection tool☆66Updated last year
- ☆127Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆128Updated 6 months ago
- ☆124Updated 11 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆84Updated 2 years ago
- Create Anti-Copy DRM Malware☆60Updated 11 months ago
- Do some DLL SideLoading magic☆85Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆98Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆105Updated last year
- ☆122Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆63Updated last year
- C# havoc implant☆101Updated 2 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆50Updated 2 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆85Updated 2 years ago
- A C# port from Invoke-GhostTask☆117Updated last year
- ☆152Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆56Updated 7 months ago
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆88Updated 3 weeks ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆203Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆27Updated 9 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆86Updated 2 years ago