wolf46russia / ASPXSpy-sh3ll
☆18Updated 5 years ago
Alternatives and similar repositories for ASPXSpy-sh3ll
Users that are interested in ASPXSpy-sh3ll are comparing it to the libraries listed below
Sorting:
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated last year
- Really stupid re-implementation of invoke-wmiexec☆13Updated 2 years ago
- 漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell☆13Updated 4 years ago
- 免杀shellcode☆14Updated 3 years ago
- badusb联动cobaltrstrike近源攻击☆26Updated 3 years ago
- ☆11Updated 3 years ago
- ☆12Updated 3 years ago
- 黑魔鬼插件☆19Updated 4 years ago
- ☆21Updated 3 years ago
- Apache CouchDB 3.2.1 - Remote Code Execution (RCE)☆29Updated 2 years ago
- Ice-Strike C2界面设计分享☆9Updated 3 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆48Updated 3 years ago
- CobaltStrike Reflective Dll Source☆19Updated 3 years ago
- Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.☆24Updated 2 years ago
- enc8 密码碰撞脚本☆32Updated 2 years ago
- EventViewer Bypass Uac Bof☆22Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- Crypt/Decrypt Proxyshell Payload☆9Updated 3 years ago
- ☆16Updated 3 years ago
- Enable RDP and set firewall by Windows API.☆19Updated 3 years ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆10Updated 3 years ago
- CobaltStrike Malleable Profile☆23Updated 3 years ago
- This is learning to write windows 32 api instance code in the golang language☆40Updated 3 years ago
- Invoke-Obfuscation-Bypass + PS2EXE 过主流杀软☆53Updated 3 years ago
- 调用Windows Api,绕过杀软添加用户☆36Updated 4 years ago
- decrypt rdp credentials to password using mimikatz.☆28Updated 4 years ago
- AiCSA,Move to https://github.com/hktalent/AiCSA☆10Updated 2 years ago
- SystemGap - Maintenance Tools after privilege escalation☆40Updated 10 months ago
- tp3注入总结☆17Updated 3 years ago
- BypassAV无net添加windows用户☆10Updated 4 years ago