0dayNinja / Windows-x64-Processes-Injector
0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)
☆52Updated 3 years ago
Alternatives and similar repositories for Windows-x64-Processes-Injector:
Users that are interested in Windows-x64-Processes-Injector are comparing it to the libraries listed below
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)☆14Updated 3 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- Polkit D-Bus Authentication Bypass Exploit☆10Updated 3 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆14Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆38Updated 3 years ago
- ☆54Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 3 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆36Updated 3 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated 2 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆11Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- Userland API Unhooker Project☆108Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Updated 5 months ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- ☆100Updated 3 years ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆38Updated 3 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- From directory deletion to SYSTEM shell☆110Updated 4 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆71Updated last year
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆52Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- Antiscan.me automatization script☆26Updated 10 months ago