0dayNinja / Windows-x64-Processes-InjectorLinks
0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)
☆51Updated 3 years ago
Alternatives and similar repositories for Windows-x64-Processes-Injector
Users that are interested in Windows-x64-Processes-Injector are comparing it to the libraries listed below
Sorting:
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)☆14Updated 3 years ago
- Polkit D-Bus Authentication Bypass Exploit☆10Updated 3 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆14Updated 3 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Alleged source code leak of Osiris banking trojan☆38Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- ☆14Updated last year
- Antiscan.me automatization script☆27Updated last year
- WikiLeaks Vault 7 CIA Hacking Tools☆11Updated 7 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆11Updated 3 years ago
- Files related to my training classes☆16Updated 4 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Updated 2 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆50Updated 2 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 4 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Updated 8 months ago
- ☆55Updated 3 years ago
- Personal notes☆10Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- MSBuild AL bypass☆14Updated 2 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆37Updated 3 years ago
- Nice try reading NTDLL from disk, nerd.☆19Updated 3 years ago
- ☆21Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 2 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆20Updated 3 years ago
- legacy Botnets source code Forked from github.com/malwares☆24Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Updated 5 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago