sh3llc0d3r1337 / windows_reverse_shell_1
Windows Reverse Shell shellcode
☆61Updated 2 years ago
Alternatives and similar repositories for windows_reverse_shell_1:
Users that are interested in windows_reverse_shell_1 are comparing it to the libraries listed below
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆109Updated 3 years ago
- PoC dlls for Task Scheduler COM Hijacking☆90Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 7 years ago
- UAC 0Day all day!☆58Updated 7 years ago
- VBS Reversed TCP Meterpreter Stager☆86Updated 7 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆87Updated 10 years ago
- JavaScript Reversed TCP Meterpreter Stager☆136Updated 7 years ago
- Platform independent peCloak fork based on Capstone☆105Updated 8 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆133Updated 7 years ago
- ☆93Updated 6 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 7 years ago
- ☆51Updated 7 years ago
- Windows Stagers to circumvent restrictive network environments☆64Updated 3 months ago
- medium-rare☆28Updated 5 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Updated 7 years ago
- Shim database persistence (Fin7 TTP)☆36Updated 4 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 3 years ago
- How To Execute Shellcode via HTA☆136Updated 6 years ago
- ☆36Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆76Updated 7 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆126Updated 8 years ago
- A simple tool to manipulate window objects in Windows☆44Updated 8 years ago