shanfenglan / dynamic_encode_shellcodeLinks
动态加解密shellcode并上线
☆24Updated 4 years ago
Alternatives and similar repositories for dynamic_encode_shellcode
Users that are interested in dynamic_encode_shellcode are comparing it to the libraries listed below
Sorting:
- 后渗透持久化控制平台; Windows Persistence Platform;☆48Updated 3 years ago
- Csharp 反射加载dll☆40Updated 3 years ago
- SystemGap - Maintenance Tools after privilege escalation☆41Updated last year
- This is learning to write windows 32 api instance code in the golang language☆40Updated 3 years ago
- 结合反射调用、动态编译、BCEL、defineClass0,ScriptEngine、Expression等技术的一款免杀JSP Webshell生成工具☆18Updated 3 years ago
- cmd2shellcode☆79Updated 4 years ago
- 轻便的恶意反代☆48Updated 4 years ago
- ☆27Updated 4 years ago
- decrypt tool for 360se_☆23Updated 4 years ago
- Python script for auto remove AV☆45Updated 5 years ago
- Apache-backdoor Apache 中间件模块后门☆52Updated 5 years ago
- c++ shellcode loader☆40Updated 2 years ago
- ☆19Updated last year
- CrossC2通信协议API实现☆84Updated 3 years ago
- 自不量力的mimikatz分离计划☆44Updated 3 years ago
- 创建服务持久化☆107Updated 4 years ago
- 调用Windows Api,绕过杀软添加用户☆36Updated 4 years ago
- DomainFronting(aliyun)远程加载shellcode,远程获取shellcode使用aes动态加密传输数据☆48Updated 4 years ago
- ☆37Updated 6 years ago
- creddump bypass AV☆42Updated 4 years ago
- PrintSpoofer的反射dll实现,结合Cobalt Strike使用☆88Updated 3 years ago
- 与反病毒软件老大哥们的打闹日常☆13Updated 6 years ago
- 在原项目上加上将找到的文件压缩打包上传oss,另外做了部分小修改。☆30Updated 4 years ago
- OXID_Find by Csharp(多线程) 通过OXID解析器获取Windows远程主机上网卡地址 From @RcoIl☆54Updated 4 years ago
- CVE-2020-1472 C++☆83Updated 2 years ago
- Really stupid re-implementation of invoke-wmiexec☆13Updated 3 years ago
- 用于Dump指定进程的内存,主要利用静默退出机制(SilentProcessExit)和Windows API(MiniDumpW)实现☆25Updated 3 years ago
- ☆21Updated 3 years ago
- Py写的tsh的流量加解密过程。☆28Updated 2 years ago
- CVE-2021-4034, For Webshell Version.☆34Updated 3 years ago