wqreytuk / -EventLogEraser-_windows_event_log_study
☆20Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for -EventLogEraser-_windows_event_log_study
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated last year
- 自用的shellcode生成框架☆29Updated last year
- Hide Port In Windows☆37Updated 3 weeks ago
- A packer which adds encrypted shell to protect your PE file☆10Updated this week
- Proofs-Of-360Security Sandbox Escape☆10Updated 2 years ago
- power-kill is a project that kill protected processes (such as EDR or AV) by injecting shellcode into high privilege processes☆46Updated 3 years ago
- UAC_wenpon☆48Updated 2 years ago
- ReflectiveDLL学习代码☆32Updated 4 years ago
- 域前置版本FRP☆15Updated last year
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆28Updated last year
- ☆36Updated 4 years ago
- 注入c#控制台到非托管进程☆16Updated 2 years ago
- ☆15Updated 4 years ago
- 一些进程注入或者Shellcode注入的实例代码,用于练习和熟悉☆18Updated 2 years ago
- CobaltStrike Reflective Dll Source☆19Updated 2 years ago
- bypass UAC even when configured to always notify user☆29Updated 3 years ago
- ☆19Updated 2 years ago
- 免杀计划任务进行权限维持,过主流杀软。 A schtask tool bypass anti-virus☆66Updated 2 years ago
- 简单安排一下 autochk.sys 这个rootkit☆67Updated last year
- 横向移动三剑客 ( Lateral movement tools)☆29Updated 3 years ago
- ☆22Updated 3 years ago
- ☆30Updated 4 years ago
- Beacon compiled using clang☆59Updated last year
- ☆38Updated last year
- DiagTrack Eop (From Service Account to SYSTEM)☆20Updated last year
- Fake proxy tool☆6Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆33Updated 6 months ago
- vehsyscall:a syscall project that may bypass EDR☆46Updated 8 months ago