3gstudent / Windows-EventLog-BypassLinks
Use subProcessTag Value From TEB to identify Event Log Threads
☆87Updated 4 years ago
Alternatives and similar repositories for Windows-EventLog-Bypass
Users that are interested in Windows-EventLog-Bypass are comparing it to the libraries listed below
Sorting:
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆59Updated 8 years ago
- Penetration test☆55Updated 4 years ago
- Small tool to load shellcodes or PEs to analyze them☆82Updated 7 years ago
- a pass-the-hash tool☆104Updated 7 years ago
- Stealing passwords every time they change☆67Updated 5 years ago
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Updated 6 years ago
- Play Doh Windows ACL Tools☆62Updated 2 years ago
- Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())☆102Updated 6 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆79Updated 6 years ago
- Create a hidden account☆75Updated 7 years ago
- Search for information from manifests☆45Updated 6 years ago
- List the programs that the current Windows system has installed☆36Updated 7 years ago
- My exercise of using Exchange Web Service(EWS)☆54Updated 4 years ago
- cobalt strike 自启动脚本☆71Updated 9 years ago
- ☆38Updated 5 years ago
- ShellCode Loader for MSF and Cobalt Strike☆56Updated last year
- Powershell to copy ntds.dit☆62Updated 9 years ago
- ☆57Updated 6 years ago
- bypass uac☆143Updated 7 years ago
- JScript RAT☆101Updated 4 years ago
- DLL_Hijacker.py☆75Updated 9 years ago
- ☆13Updated 7 years ago
- My pentest tools used two years ago. Part1☆17Updated 8 years ago
- Security Support Provider Interface☆47Updated 5 years ago
- AggressorScript-RunDumpHash