3gstudent / Windows-EventLog-Bypass
Use subProcessTag Value From TEB to identify Event Log Threads
☆83Updated 3 years ago
Alternatives and similar repositories for Windows-EventLog-Bypass:
Users that are interested in Windows-EventLog-Bypass are comparing it to the libraries listed below
- Small tool to load shellcodes or PEs to analyze them☆81Updated 6 years ago
- a pass-the-hash tool☆108Updated 6 years ago
- Create a hidden account☆75Updated 7 years ago
- Play Doh Windows ACL Tools☆60Updated 2 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago
- Search for information from manifests☆44Updated 6 years ago
- Stealing passwords every time they change☆66Updated 4 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆78Updated 6 years ago
- ☆93Updated 3 years ago
- bypass uac☆142Updated 6 years ago
- Penetration test☆55Updated 3 years ago
- Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())☆102Updated 6 years ago
- Learn from Casey Smith@subTee☆29Updated 3 years ago
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Updated 5 years ago
- No inline asm,support x86/x64☆64Updated 3 years ago
- EoP POC for CVE-2019-1132☆61Updated 5 years ago
- aggressor-script 中文翻译 aggressor-script 使用☆43Updated 7 years ago
- ShellCode Loader for MSF and Cobalt Strike☆54Updated 9 months ago
- ☆90Updated 3 years ago
- integration ms17010 and nsa-EternalBlue☆38Updated 6 years ago
- ☆128Updated 5 years ago
- List the programs that the current Windows system has installed☆36Updated 7 years ago
- cobalt strike 自启动脚本☆70Updated 8 years ago
- ☆68Updated 2 years ago
- ☆77Updated 6 years ago
- Cobalt Strike AggressorScripts CVE-2020-0796☆79Updated 4 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆136Updated 4 years ago
- CVE-2019-1458 Windows LPE Exploit☆135Updated 4 years ago
- SecistSploit☆16Updated 6 years ago
- dll proxying☆55Updated 3 years ago