AgigoNoTana / HiddenDesktopViewer
This tool reveals hidden desktops and investigate processes/threads utilizing hidden desktops
☆121Updated 4 years ago
Alternatives and similar repositories for HiddenDesktopViewer
Users that are interested in HiddenDesktopViewer are comparing it to the libraries listed below
Sorting:
- Botnet system from deep-web Russians forums. Tiny Nuke!☆91Updated 7 years ago
- 基于Tinynuke修复得到的HVNC☆163Updated 3 years ago
- LOLBINs that inject a DLL into a given process ID.☆137Updated 3 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆63Updated 2 years ago
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆202Updated 6 months ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆161Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- A simple Botnet. 一个简单的僵尸网络Bot。☆23Updated 4 years ago
- Extracts cookies from Chrome.☆202Updated 2 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆50Updated 3 years ago
- NanoCore rat stub source code☆38Updated 2 years ago
- Bypass UAC by hijacking a DLL located in the Native Image Cache☆213Updated 3 years ago
- Convert PE files to a shellcode☆75Updated 5 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆55Updated 2 years ago
- A rework of CMLuaUtil AutoElevated☆25Updated 2 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆35Updated 4 years ago
- User Mode Windows Rootkit☆61Updated last year
- Process Ghosting in C#☆213Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆199Updated 3 years ago
- Injecting shellcode into a process memory and executing it in C#☆54Updated 2 years ago
- Execute a payload at each right click on a file/folder in the explorer menu for persistence☆174Updated 2 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆273Updated 3 years ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆225Updated 2 years ago
- This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of alm…☆107Updated 2 years ago
- C# binary with embeded golang hack-browser-data☆96Updated 3 years ago
- Windows NTLM Authentication Backdoor☆235Updated 3 months ago
- BitRat Source Code☆42Updated 4 years ago
- Windows Defender ShellCode Execution Bypass☆128Updated 5 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆153Updated 4 years ago