从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能
☆11Mar 11, 2020Updated 5 years ago
Alternatives and similar repositories for PyC2-demo
Users that are interested in PyC2-demo are comparing it to the libraries listed below
Sorting:
- SyscallLoader☆11Sep 13, 2021Updated 4 years ago
- python-shellcode加载器☆11Oct 28, 2019Updated 6 years ago
- ☆11Jan 29, 2021Updated 5 years ago
- Lightweight C# windows agent for Apfell☆17Mar 16, 2020Updated 5 years ago
- Execute DLL via the Excel.Application object's RegisterXLL() method☆22Apr 17, 2021Updated 4 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Dec 27, 2019Updated 6 years ago
- ShellCodeLoader via DInvoke☆60Jul 5, 2021Updated 4 years ago
- RDI implementation in Nim☆64Dec 12, 2020Updated 5 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Jul 31, 2020Updated 5 years ago
- DLL Unhooking☆13Mar 26, 2021Updated 4 years ago
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- This is a random process injector, and more injection techniques will be added in the future.☆13Jul 17, 2020Updated 5 years ago
- Utilizing MMF as a execution space for shell code☆10Aug 28, 2018Updated 7 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- ☆26May 22, 2021Updated 4 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Aug 31, 2021Updated 4 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆46Sep 16, 2021Updated 4 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- 通过webshell实现的内网穿透工具☆49Nov 19, 2019Updated 6 years ago
- HackBrowserData的反射模块☆177Mar 13, 2021Updated 4 years ago
- Windows 7/2008 R2 EoP☆13Feb 12, 2021Updated 5 years ago
- This contains a bundle with an executable to exploit ms17-010 remote or locally. It does not require Python.☆16Jan 10, 2019Updated 7 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆129May 25, 2021Updated 4 years ago
- My CobaltStrike BOFS☆167Jul 23, 2022Updated 3 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- ☆38Jul 14, 2020Updated 5 years ago
- 使得Cobaltstrike支持Atexec☆89Jun 30, 2020Updated 5 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆38May 12, 2022Updated 3 years ago
- Windows 反射式注入DLL☆35Dec 8, 2018Updated 7 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago
- ☆20Feb 27, 2022Updated 4 years ago