wolf46russia / ASPXSpy-sh3ll
☆18Updated 5 years ago
Alternatives and similar repositories for ASPXSpy-sh3ll:
Users that are interested in ASPXSpy-sh3ll are comparing it to the libraries listed below
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated last year
- 漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell☆13Updated 4 years ago
- EventViewer Bypass Uac Bof☆22Updated 2 years ago
- Really stupid re-implementation of invoke-wmiexec☆13Updated 2 years ago
- tp3注入总结☆17Updated 3 years ago
- 免杀shellcode☆14Updated 3 years ago
- CobaltStrike Malleable Profile☆23Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- desktop screenshot☆29Updated 2 years ago
- ☆11Updated 3 years ago
- ☆12Updated 3 years ago
- 黑魔鬼插件☆19Updated 4 years ago
- automatic privilege escalation by pspy☆22Updated 3 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆47Updated 3 years ago
- ☆16Updated 3 years ago
- Crypt/Decrypt Proxyshell Payload☆9Updated 3 years ago
- Enable RDP and set firewall by Windows API.☆19Updated 3 years ago
- 调用Windows Api,绕过杀软添加用户☆36Updated 4 years ago
- Windows & linux Echo to file command converter☆24Updated 3 years ago
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- Post-exploitation script developed using impacket☆21Updated 3 years ago
- Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.☆24Updated 2 years ago
- Apache CouchDB 3.2.1 - Remote Code Execution (RCE)☆29Updated 2 years ago
- SharpRDP改编版☆20Updated 4 years ago
- Cobalt Strike RCE CVE-2022-39197☆17Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 3 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆10Updated 3 years ago
- SystemGap - Maintenance Tools after privilege escalation☆40Updated 10 months ago
- DiagTrack Eop (From Service Account to SYSTEM)☆22Updated 2 years ago
- 通过gzip一边压缩一 边使用tcp上传文件夹。☆17Updated 2 years ago