tihanyin / Simple-Reverse-Shell
Simple reverse shell to avoid Win 11 defender detection
☆118Updated 3 years ago
Alternatives and similar repositories for Simple-Reverse-Shell:
Users that are interested in Simple-Reverse-Shell are comparing it to the libraries listed below
- Koppeling x Metatwin x LazySign☆209Updated 3 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆156Updated 2 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆301Updated 3 years ago
- Bypassing AppLocker with C#☆138Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated 2 years ago
- A BOF to automate common persistence tasks for red teamers☆271Updated 2 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Updated 2 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- C# Lsass parser☆289Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆157Updated 3 years ago
- Dump stuff without touching disk☆162Updated 4 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆227Updated 3 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆246Updated last year
- How to spoof the command line when spawning a new process from C#.☆106Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆155Updated 3 years ago
- ☆164Updated 2 years ago
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆319Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆297Updated 2 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆257Updated 3 years ago
- Simple EDR implementation to demonstrate bypass☆171Updated 4 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆228Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆210Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆301Updated last year
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆173Updated last month
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆73Updated 4 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Updated 3 years ago
- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)☆117Updated last year
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!☆439Updated 2 years ago
- Evasive Process Hollowing Techniques☆137Updated 4 years ago