ASkyeye / Artillery
CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrator.
☆14Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for Artillery
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆21Updated 2 years ago
- ☆45Updated 4 months ago
- Fork & modify of Wireguard's Memmod☆31Updated last year
- 一款利用某云厂商的物联网平台作为c2的框架☆23Updated last year
- desktop screenshot☆29Updated last year
- DiagTrack Eop (From Service Account to SYSTEM)☆20Updated last year
- ☆30Updated last year
- Cs-Sleep-Mask-Fiber☆16Updated 2 months ago
- query specific user and login IP from remote machine☆17Updated 2 years ago
- Golang implement winrm client with pass the hash☆30Updated 6 months ago
- Learning notes of amazing Sliver C2 project.☆24Updated last year
- dump lsass tool☆39Updated 2 years ago
- BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel☆14Updated 5 months ago
- ☆21Updated last year
- Stop Windows Defender programmatically☆15Updated 2 years ago
- AddDefenderExclusions Beacon Object File☆31Updated last year
- Silently Install Chrome Extension For Persistence☆43Updated 4 months ago
- ☆12Updated 2 years ago
- ☆38Updated last year
- resource-based constrained delegation RBCD☆43Updated 2 years ago
- MSSQL CLR for pentest.☆53Updated last year
- Post-exploitation script developed using impacket☆21Updated 2 years ago
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆37Updated 2 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆36Updated 2 years ago
- redteam Build platform☆19Updated last year
- Load ssp dll golang implementation☆17Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆38Updated last year
- dump lsass☆36Updated 2 years ago