接渗透 提权 免杀过 edr 卡巴 小红伞 火绒360核晶 telegram@xiga857
-
Updated
Jun 22, 2024
接渗透 提权 免杀过 edr 卡巴 小红伞 火绒360核晶 telegram@xiga857
This repository features a demonstration of a Shell Code Loader designed for Cobalt Strike. This loader is engineered to be undetectable by major endpoint detection and response (EDR) systems and antivirus software, allowing for stealthy execution of shellcode during red teaming operations.
Stack Spoofing
Very powerful stealer + miner + rat + keylogger + clipper. Supports Android.
Carbon Crypter / Packer
This repo contains a implimentation of the Process Hollowing tehcnique.
Very powerful stealer + miner + rat + keylogger + clipper. Supports Android.
Remote access trojan
Very powerful stealer + miner + rat + keylogger + clipper. Supports Android.
BX Private
The best stealer with low detection coded in Python, C#, and JavaScript
Very powerful stealer + miner + rat + keylogger + clipper. Supports Android.
The RunPE program is written in C# to execute a specific executable file within another files memory using the ProcessHollowing technique.
Very powerful stealer + miner + rat + keylogger + clipper. Supports Android.
Very powerful stealer + miner + rat + keylogger + clipper. Supports Android.
Very powerful stealer + miner + rat + keylogger + clipper. Supports Android.
Add a description, image, and links to the bypass-av topic page so that developers can more easily learn about it.
To associate your repository with the bypass-av topic, visit your repo's landing page and select "manage topics."