sh3llc0d3r1337 / windows_reverse_shell_1Links
Windows Reverse Shell shellcode
☆61Updated 2 years ago
Alternatives and similar repositories for windows_reverse_shell_1
Users that are interested in windows_reverse_shell_1 are comparing it to the libraries listed below
Sorting:
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 3 years ago
- PoC dlls for Task Scheduler COM Hijacking☆94Updated 8 years ago
- VBS Reversed TCP Meterpreter Stager☆87Updated 8 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 8 years ago
- How To Execute Shellcode via HTA☆139Updated 7 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆131Updated 3 months ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- CVE-2018-8440 standalone exploit☆79Updated 6 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 6 years ago
- medium-rare☆28Updated 5 years ago
- ☆94Updated 6 years ago
- with metasploit☆63Updated 5 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆128Updated 8 years ago
- ☆94Updated 6 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆40Updated 8 years ago
- VBA Reversed TCP Meterpreter Stager☆62Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆216Updated 4 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆137Updated 7 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 8 years ago
- Python api for usage with cobalt strike's External C2 specification☆237Updated 2 years ago
- Python api for usage with cobalt strike's External C2 specification☆62Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆79Updated 8 years ago
- ☆44Updated 5 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 7 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆76Updated 6 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 8 years ago
- Windows Stagers to circumvent restrictive network environments☆66Updated 8 months ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆66Updated 3 months ago
- MS17-010☆63Updated 7 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆32Updated 6 years ago