wh1tor / getsystem-for-cobaltstrikeView external linksLinks
Use powershell to getsystem with token dumplication
☆10Dec 6, 2019Updated 6 years ago
Alternatives and similar repositories for getsystem-for-cobaltstrike
Users that are interested in getsystem-for-cobaltstrike are comparing it to the libraries listed below
Sorting:
- 资源分享☆19Nov 3, 2018Updated 7 years ago
- AggressorScript-RunDumpHash☆19Oct 9, 2019Updated 6 years ago
- Windows hack programming skills and common modules / Windows hack 编程技巧及通用模块☆23Dec 8, 2019Updated 6 years ago
- python ShellCode Loader (Cobaltstrike&Metasploit)☆20Nov 28, 2019Updated 6 years ago
- 在线cms识别|旁站|c段|信息泄露|工控|系统|物联网安全|cms漏洞扫描|nmap端口扫描|子域名获取|待续..☆10Apr 23, 2019Updated 6 years ago
- ☆26Apr 24, 2025Updated 9 months ago
- 这是一个直接取得系统权限的项目☆48Jun 24, 2020Updated 5 years ago
- automated sticky keys backdoor☆10Feb 12, 2016Updated 10 years ago
- CobaltStrike AggressorScripts for the lazy☆10Jul 22, 2022Updated 3 years ago
- ☆30Mar 21, 2023Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- tp3注入总结☆19Jan 6, 2022Updated 4 years ago
- payloads☆15Mar 17, 2021Updated 4 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- 调用Windows Api,绕过杀软添加用户☆36Oct 8, 2020Updated 5 years ago
- pandownload.com-resource☆32Apr 16, 2020Updated 5 years ago
- SecistSploit☆17Dec 6, 2018Updated 7 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Offensive C# Tooling☆101Oct 5, 2024Updated last year
- Beacon Object Files.☆36Feb 26, 2024Updated last year
- 简单的分离免杀demo☆42Apr 23, 2021Updated 4 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Weblogic,CVE-2018-2894☆18Sep 11, 2019Updated 6 years ago
- ☆21Apr 1, 2020Updated 5 years ago
- weblogic漏洞利用工具☆18Jul 16, 2020Updated 5 years ago
- The project uses popular anti-virus protection bypass techniques☆12Nov 26, 2018Updated 7 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- ☆50Mar 30, 2021Updated 4 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆118Mar 16, 2020Updated 5 years ago
- ☆18Sep 21, 2019Updated 6 years ago
- ☆22Jan 7, 2021Updated 5 years ago
- Welcome to my blog☆19Oct 3, 2017Updated 8 years ago
- 动态链接库加载工具☆20Jan 26, 2022Updated 4 years ago
- Cs-Sleep-Mask-Fiber☆18May 16, 2025Updated 8 months ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- Arduino+esp8266+钓鱼wifi(20RMB)☆24Mar 6, 2022Updated 3 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- 🌏 [WIP]整理好了之后迁移到 cdk-team/document,包含各类容器、K8s攻防场景的CDK文档。☆25Apr 16, 2022Updated 3 years ago
- 远程内存加载Python模块☆21Sep 12, 2019Updated 6 years ago