testxxxzzz / geacon_proLinks
重构了Cobaltstrike Beacon,行为对国内主流杀软免杀,支持4.1以上的版本。 A cobaltstrike Beacon bypass anti-virus, supports 4.1+ version.
☆322Updated 2 years ago
Alternatives and similar repositories for geacon_pro
Users that are interested in geacon_pro are comparing it to the libraries listed below
Sorting:
- 将dll exe 等转成shellcode 最后输出exe 可定制加载器模板 支持白文件的捆绑 shellcode 加密☆368Updated 3 years ago
- 基于 OPSEC 的 CobaltStrike 后渗透自动化链☆447Updated last year
- EDR 绕过demo☆292Updated last year
- 使用多种WinAPI进行权限维持的CobaltStrike脚本,包含API设置系统服务,设置计划任务,管理用户等。☆550Updated 3 years ago
- 远程shellcode加载&权限维持+小功能☆302Updated last year
- 寻找可利用的白文件☆538Updated last month
- 通过生成不同hash的ico并写入程序中,实现批量bypass360QVM☆253Updated 2 years ago
- Some demos to bypass EDRs or AVs by 78itsT3@m☆357Updated 3 years ago
- Burp插件,Malleable C2 Profiles生成器;可以通过Burp代理选中请求,生成Cobalt Strike的profile文件(CSprofile)☆286Updated 3 years ago
- EXE转ShellCode工具☆226Updated 3 years ago
- CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch.☆317Updated 3 years ago
- 创建隐藏计划任务,权限维持,Bypass AV☆549Updated 4 years ago
- Syscall免杀☆510Updated last year
- 域内自动化信息搜集利用工具☆434Updated last year
- 风暴免杀-bypass defender、360、vt☆197Updated 2 years ago
- 自己开的cs插件☆245Updated 2 years ago
- Bypass_AV msf免杀,ShellCode免杀加载器 ,免杀shellcode执行程序 ,360&火绒&Windows Defender☆224Updated 3 years ago
- dump lsass进程工具☆558Updated 2 years ago
- GO免杀shellcode加载器混淆AES加密☆253Updated 3 years ago
- 免杀某60、火绒、pythonShellcode-loader☆55Updated 2 years ago
- bypassAll静态引擎,如绕过QVM,绕过VT所有静态引擎☆146Updated last year
- golang 实现的windows and linux 端口复用工具。☆300Updated last year
- 域信息收集工具☆406Updated 3 years ago
- 通过反射DLL注入、Win API、C#、以及底层实现NetUserAdd方式实现BypassAV进行增加用户的功能,实现Cobalt Strike插件化☆342Updated 3 years ago
- 一键生成免杀木马的 shellcode 免杀框架☆187Updated last year
- ☆297Updated 7 months ago
- shellcode loader,bypassav,免杀,一款基于python的shellcode免杀加载器☆136Updated last year
- 免杀版Neo-reGeorg☆265Updated 2 years ago
- 基于Golang实现的Shellcode内存加载器,共实现3中内存加载shellcode方式,UUID加载,MAC加载和IPv4加载,目前能过主流杀软(包括Windows Defender)☆253Updated 3 years ago
- ☆144Updated 2 years ago