uvzz / IERat
A basic C2 Framework with an internet explorer based agent
☆15Updated 3 years ago
Alternatives and similar repositories for IERat:
Users that are interested in IERat are comparing it to the libraries listed below
- Grafana Arbitrary File Reading Vulnerability☆27Updated 3 years ago
- proxyshell payload generate☆73Updated 3 years ago
- 黑魔鬼插件☆19Updated 4 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆47Updated 3 years ago
- BCEL class转换插件☆25Updated 4 years ago
- ☆19Updated 10 months ago
- redshift-jdbc-RCE proof☆1Updated 2 years ago
- desktop screenshot☆29Updated 2 years ago
- Really stupid re-implementation of invoke-wmiexec☆13Updated 2 years ago
- Post-exploitation script developed using impacket☆21Updated 3 years ago
- Python script for auto remove AV☆45Updated 4 years ago
- This is learning to write windows 32 api instance code in the golang language☆40Updated 3 years ago
- UAC_wenpon☆48Updated 3 years ago
- SystemGap - Maintenance Tools after privilege escalation☆40Updated 10 months ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- 用于Dump指定进程的内存,主要利用静默退出机制(SilentProcessExit)和Windows API(MiniDumpW)实现☆25Updated 3 years ago
- automatic privilege escalation by pspy☆22Updated 3 years ago
- Java XMLDecoder payload generator☆15Updated 3 years ago
- MSFRottenPotato built as a Reflective DLL. Work in progress. Gotta love Visual C++☆30Updated 6 years ago
- Imitate CobaltStrike's Shellcode Generation☆3Updated 3 years ago
- Csharp 反射加载dll☆40Updated 3 years ago
- Citrix ADC从权限绕过到RCE☆45Updated 4 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Updated 3 years ago
- CVE-2021-26855 & CVE-2021-27065☆27Updated 4 years ago
- ☆19Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 3 years ago
- ☆37Updated 6 years ago
- Goal Go Red-Team 工具类☆44Updated 3 months ago
- ☆21Updated 3 years ago
- CVE-2021-36798: CobaltStrike < 4.4 Dos☆103Updated 3 years ago