CERTCC / privescLinks
Process Monitor filter for finding privilege escalation vulnerabilities on Windows
☆79Updated 4 years ago
Alternatives and similar repositories for privesc
Users that are interested in privesc are comparing it to the libraries listed below
Sorting:
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 4 years ago
- ☆55Updated 4 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆106Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- AMSI Bypass Via the Heap☆107Updated 5 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆88Updated 3 years ago
- RDPThief donut shellcode inject into mstsc☆88Updated 4 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆53Updated 4 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆129Updated 4 years ago
- ☆37Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 5 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆109Updated 4 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53Updated 5 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 5 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 3 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- .NET project for installing Persistence☆63Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆69Updated 3 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- ☆23Updated 3 years ago
- Managed code hooking template.☆134Updated 4 years ago
- ☆43Updated 3 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Updated 3 years ago
- ☆101Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- DInvisibleRegistry☆82Updated 5 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- ☆39Updated 4 years ago