CERTCC / privesc
Process Monitor filter for finding privilege escalation vulnerabilities on Windows
☆78Updated 3 years ago
Alternatives and similar repositories for privesc:
Users that are interested in privesc are comparing it to the libraries listed below
- ☆55Updated 3 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆121Updated 3 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆102Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆122Updated 3 years ago
- AMSI Bypass Via the Heap☆105Updated 4 years ago
- .NET project for installing Persistence☆64Updated 3 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆70Updated 4 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆100Updated last year
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆70Updated 3 years ago
- DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userla…☆120Updated 2 years ago
- Windows internals and exploitation tricks☆92Updated 3 months ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- A tool to create COM class/interface relationships in neo4j☆48Updated 2 years ago
- A simple COM server which provides a component to run shellcode☆133Updated 4 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆56Updated 2 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆51Updated 3 years ago
- ☆42Updated 2 years ago
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆74Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆98Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- RDPThief donut shellcode inject into mstsc☆83Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- IOXIDResolver from AirBus Security/PingCastle☆47Updated 4 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆88Updated 2 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- PE File Blessing - To continue or not to continue☆86Updated 5 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆47Updated 4 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- ☆38Updated 2 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆38Updated 3 years ago