CERTCC / privescLinks
Process Monitor filter for finding privilege escalation vulnerabilities on Windows
☆79Updated 4 years ago
Alternatives and similar repositories for privesc
Users that are interested in privesc are comparing it to the libraries listed below
Sorting:
- ☆55Updated 3 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆104Updated 2 years ago
- AMSI Bypass Via the Heap☆107Updated 4 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Updated 4 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆123Updated 4 years ago
- RDPThief donut shellcode inject into mstsc☆88Updated 4 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆87Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 3 years ago
- DInvisibleRegistry☆82Updated 4 years ago
- .NET project for installing Persistence☆63Updated 3 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- Windows internals and exploitation tricks☆106Updated 3 months ago
- ☆23Updated 3 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆108Updated 3 years ago
- ☆37Updated 3 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆54Updated 5 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆74Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆66Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- ☆43Updated 3 years ago
- Smart Card PIN swiping DLL☆78Updated 5 years ago
- ☆39Updated 4 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago