CERTCC / privescLinks
Process Monitor filter for finding privilege escalation vulnerabilities on Windows
☆79Updated 3 years ago
Alternatives and similar repositories for privesc
Users that are interested in privesc are comparing it to the libraries listed below
Sorting:
- ☆55Updated 3 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆103Updated 3 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆103Updated 2 years ago
- AMSI Bypass Via the Heap☆107Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 4 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Updated 3 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆121Updated 4 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 2 years ago
- ☆37Updated 3 years ago
- ☆41Updated 2 years ago
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆74Updated 4 years ago
- ☆82Updated 3 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆53Updated 3 years ago
- .NET project for installing Persistence☆64Updated 3 years ago
- ☆57Updated 4 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Windows internals and exploitation tricks☆95Updated 6 months ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53Updated 5 years ago
- DoppelGate relies on reading ntdll on disk to grab syscall stubs, and patches these syscall stubs into desired functions to bypass Userla…☆121Updated 3 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆101Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆62Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆62Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated 11 months ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆124Updated 2 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆61Updated 3 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 4 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆83Updated 2 years ago
- RDPThief donut shellcode inject into mstsc☆87Updated 4 years ago
- A simple COM server which provides a component to run shellcode☆135Updated 5 years ago