tihanyin / Simple-Reverse-ShellLinks
Simple reverse shell to avoid Win 11 defender detection
☆119Updated 3 years ago
Alternatives and similar repositories for Simple-Reverse-Shell
Users that are interested in Simple-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- Koppeling x Metatwin x LazySign☆210Updated 3 years ago
- C# Lsass parser☆291Updated 3 years ago
- Bypassing AppLocker with C#☆140Updated 3 years ago
- How to spoof the command line when spawning a new process from C#.☆106Updated 3 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Updated 2 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆258Updated 3 years ago
- Hookers are cooler than patches.☆169Updated 3 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆247Updated 2 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆157Updated 2 years ago
- Stop Windows Defender using the Win32 API☆193Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆181Updated last month
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆74Updated 4 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated 2 years ago
- A BOF to automate common persistence tasks for red teamers☆277Updated 2 years ago
- C# version of MDSec's ParallelSyscalls☆141Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆232Updated 2 years ago
- Run Powershell without software restrictions.☆285Updated 3 years ago
- Remotely enables Restricted Admin Mode☆210Updated 3 years ago
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆7Updated 3 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆307Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆229Updated 3 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆138Updated 2 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆229Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆88Updated 5 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- Process Ghosting in C#☆215Updated 3 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆127Updated 3 years ago
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆165Updated 3 years ago