ASkyeye / ArtilleryLinks
CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator.
☆14Updated last year
Alternatives and similar repositories for Artillery
Users that are interested in Artillery are comparing it to the libraries listed below
Sorting:
- ☆30Updated 2 years ago
- DiagTrack Eop (From Service Account to SYSTEM)☆23Updated 2 years ago
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Updated 3 years ago
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated 2 years ago
- Learning notes of amazing Sliver C2 project.☆25Updated 2 years ago
- ☆46Updated last year
- Cs-Sleep-Mask-Fiber☆18Updated 5 months ago
- desktop screenshot☆29Updated 2 years ago
- Fork & modify of Wireguard's Memmod☆33Updated 2 years ago
- dump lsass tool☆38Updated 3 years ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆26Updated last year