senzee1984 / Windows_x64_Tcp_Reverse_Shell_Shellcode
Null-free shellcode for TCP reverse shell on Windows x64
☆54Updated last year
Alternatives and similar repositories for Windows_x64_Tcp_Reverse_Shell_Shellcode:
Users that are interested in Windows_x64_Tcp_Reverse_Shell_Shellcode are comparing it to the libraries listed below
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- ApexLdr is a DLL Payload Loader written in C☆109Updated 7 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- ☆120Updated last year
- ☆151Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆76Updated 2 years ago
- ☆123Updated 6 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- Threadless shellcode injection tool☆63Updated 6 months ago
- ☆123Updated last year
- Library of BOFs to interact with SQL servers☆159Updated 2 months ago
- TypeLib persistence technique☆107Updated 4 months ago
- ☆93Updated 6 months ago
- ☆78Updated last year
- Create Anti-Copy DRM Malware☆52Updated 6 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆92Updated last year
- ☆115Updated last year
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆147Updated last year
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆78Updated last month
- ☆95Updated last year
- ErebusGate for Nim Bypass AV/EDR☆161Updated 2 years ago
- CobaltStrike BOF to spawn Beacons using DLL Application Directory Hijacking☆225Updated last year
- ☆79Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆81Updated 2 years ago
- A C# port from Invoke-GhostTask☆112Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆90Updated 11 months ago
- Just another C2 Redirector using CloudFlare.☆87Updated 9 months ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Updated 2 years ago