Cooolis-ms是一个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具,它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的代码,帮助红队人员更方便快捷的从Web容器环境切换到C2环境进一步进行工作。
-
Updated
Jun 18, 2024 - C++
Cooolis-ms是一个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具,它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的代码,帮助红队人员更方便快捷的从Web容器环境切换到C2环境进一步进行工作。
elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative
A C/C++ implementation of Microsoft's Antimalware Scan Interface
DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
Hybrid client emulator (python and C++) for Metin2.
Inject Metasploit Shell Code in Legitimate Process
Carloop metaspoit framework relay for carloop. Based on Craig Smith's example.
Barely modified version of lonelypotato's work. Added 32-bit binary (64-bit was already present) and some clarification about the install.
Add a description, image, and links to the metasploit topic page so that developers can more easily learn about it.
To associate your repository with the metasploit topic, visit your repo's landing page and select "manage topics."