tihanyin / Simple-Reverse-ShellLinks
Simple reverse shell to avoid Win 11 defender detection
☆121Updated 3 years ago
Alternatives and similar repositories for Simple-Reverse-Shell
Users that are interested in Simple-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Updated 2 years ago
- How to spoof the command line when spawning a new process from C#.☆107Updated 3 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- Malicious Shortcut(.lnk) Generator☆85Updated 6 years ago
- Bypassing AppLocker with C#☆141Updated 4 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆88Updated 5 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆159Updated 2 years ago
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆74Updated 4 years ago
- Extendable payload obfuscation and delivery framework☆145Updated 2 years ago
- Dump stuff without touching disk☆164Updated 4 years ago
- Simple rapper for Mimikatz, bypass Defender☆140Updated 3 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆134Updated 3 years ago
- Remotely enables Restricted Admin Mode☆211Updated 3 years ago
- Process Ghosting Tool☆174Updated 4 years ago
- ☆165Updated last year
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆308Updated 3 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆251Updated 2 years ago
- Stop Windows Defender using the Win32 API☆194Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆186Updated this week
- A technique of hiding malicious shellcode via Shannon encoding.☆255Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆219Updated 3 years ago
- ☆166Updated 2 years ago
- Process Ghosting in C#☆216Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- C# code to Sandbox Defender (and most probably other AV/EDRs).☆166Updated 3 years ago
- Simple DLL that add a user to the local Administrators group☆78Updated 3 years ago
- ☆123Updated last year
- Get fresh Syscalls from a fresh ntdll.dll copy☆232Updated 3 years ago
- A list of all the DLLs export in C:\windows\system32\☆218Updated 3 years ago