tihanyin / Simple-Reverse-ShellLinks
Simple reverse shell to avoid Win 11 defender detection
☆119Updated 3 years ago
Alternatives and similar repositories for Simple-Reverse-Shell
Users that are interested in Simple-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 2 years ago
- Hookers are cooler than patches.☆169Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated 2 years ago
- Bypassing AppLocker with C#☆141Updated 3 years ago
- Koppeling x Metatwin x LazySign☆212Updated 3 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆88Updated 5 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆247Updated 2 years ago
- Dump stuff without touching disk☆163Updated 4 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆298Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆302Updated last year
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆128Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆243Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆181Updated 2 months ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆160Updated 5 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆258Updated 3 years ago
- Bypass AMSI by patching AmsiScanBuffer☆267Updated 4 years ago
- ☆135Updated 4 years ago
- Patching AmsiOpenSession by forcing an error branching☆146Updated last year
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆307Updated 3 years ago
- official repo for the AdHuntTool (part of the old RedTeamCSharpScripts repo)☆233Updated 3 years ago
- A BOF to automate common persistence tasks for red teamers☆279Updated 2 years ago
- Run Your Payload Without Running Your Payload☆182Updated 2 years ago
- How to spoof the command line when spawning a new process from C#.☆107Updated 3 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆232Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆146Updated 3 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆217Updated 3 years ago
- Process Ghosting Tool☆174Updated 4 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆256Updated 2 years ago
- Remotely enables Restricted Admin Mode☆210Updated 3 years ago