ASkyeye / Artillery
CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator.
☆14Updated last year
Alternatives and similar repositories for Artillery:
Users that are interested in Artillery are comparing it to the libraries listed below
- DiagTrack Eop (From Service Account to SYSTEM)☆22Updated 2 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Updated 2 years ago
- Fork & modify of Wireguard's Memmod☆32Updated last year
- ☆30Updated 2 years ago
- ☆45Updated 10 months ago
- query specific user and login IP from remote machine☆17Updated 2 years ago
- desktop screenshot☆29Updated 2 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated 2 years ago
- dump lsass tool☆39Updated 2 years ago
- Cs-Sleep-Mask-Fiber☆17Updated 7 months ago
- Basic Psexec clone, but in golang.☆15Updated 2 years ago
- Stop Windows Defender programmatically☆15Updated 3 years ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆22Updated 10 months ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 3 years ago
- ☆40Updated last year
- ☆12Updated 6 months ago
- Golang implement winrm client with pass the hash☆31Updated last year
- ☆23Updated last week
- ☆13Updated 2 years ago
- resource-based constrained delegation RBCD☆44Updated 3 years ago
- redteam Build platform☆19Updated last year
- Py写的tsh的流量加解密过程。☆28Updated 2 years ago
- Post-exploitation script developed using impacket☆21Updated 3 years ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated last year
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- ScareCrow loader binary source which easier to read and learn☆25Updated 3 years ago
- Load ssp dll golang implementation☆19Updated 3 years ago
- ☆12Updated 4 years ago
- ☆19Updated 2 years ago