A-mIn3 / Windows_PostexLinks
Post-explotation Hacks
☆14Updated 6 years ago
Alternatives and similar repositories for Windows_Postex
Users that are interested in Windows_Postex are comparing it to the libraries listed below
Sorting:
- Capture Webcam Reflective Dll☆8Updated 9 years ago
- Common Malware Techniques☆13Updated 2 years ago
- just a basic rootkit for learning how to playing sys_call_table☆14Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 10 years ago
- ☆10Updated 7 years ago
- C++ WinSock2 PCAP with RDI☆13Updated 8 years ago
- Windows registry files interactive viewer☆9Updated 8 years ago
- ☆10Updated 11 years ago
- ☆18Updated 7 years ago
- metasploit loader with antivirus bypass module☆17Updated 9 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- Set of useful scrpts☆10Updated 10 years ago
- UAC Copy Tool☆9Updated 9 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Updated 7 years ago
- does reflective dll injection☆8Updated 11 years ago
- EventList - the Baseline Event Analyzer☆11Updated 6 years ago
- it's a simple LKM rootkit.☆12Updated 8 years ago
- ☆10Updated 7 years ago
- ☆12Updated 7 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 9 months ago
- HeartBreaker, GUI for Radamsa☆7Updated 7 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 9 years ago
- ☆22Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆13Updated 9 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- Shellcode injection using debugging APIs☆19Updated 11 years ago