sh3llc0d3r1337 / windows_reverse_shell_1Links
Windows Reverse Shell shellcode
☆61Updated 3 years ago
Alternatives and similar repositories for windows_reverse_shell_1
Users that are interested in windows_reverse_shell_1 are comparing it to the libraries listed below
Sorting:
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 3 years ago
- VBS Reversed TCP Meterpreter Stager☆88Updated 8 years ago
- PoC dlls for Task Scheduler COM Hijacking☆94Updated 8 years ago
- Reflective Polymorphism☆104Updated 6 years ago
- ☆76Updated 7 years ago
- How To Execute Shellcode via HTA☆139Updated 7 years ago
- ☆94Updated 6 years ago
- Python api for usage with cobalt strike's External C2 specification☆62Updated 6 years ago
- VBA Reversed TCP Meterpreter Stager☆62Updated 7 years ago
- with metasploit☆63Updated 5 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆76Updated 6 years ago
- Windows Stagers to circumvent restrictive network environments☆66Updated 9 months ago
- ☆110Updated 7 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 8 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆128Updated 8 years ago
- DLL Generator for side loading attack☆173Updated 6 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- ☆83Updated 9 years ago
- medium-rare☆28Updated 5 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 8 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 8 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆146Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 6 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆61Updated 4 months ago
- Generates anti-sandbox analysis HTA files without payloads☆119Updated 8 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆138Updated 7 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆52Updated 7 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago