CERTCC / privescLinks
Process Monitor filter for finding privilege escalation vulnerabilities on Windows
☆79Updated 4 years ago
Alternatives and similar repositories for privesc
Users that are interested in privesc are comparing it to the libraries listed below
Sorting:
- ☆55Updated 3 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆104Updated 2 years ago
- RDPThief donut shellcode inject into mstsc☆88Updated 4 years ago
- AMSI Bypass Via the Heap☆107Updated 4 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆123Updated 4 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆88Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Updated 4 years ago
- Windows internals and exploitation tricks☆105Updated 4 months ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆67Updated 3 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- .NET project for installing Persistence☆63Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 3 years ago
- Rewrote HellsGate in C# for fun and learning☆86Updated 3 years ago
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆65Updated 5 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆104Updated 4 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 3 years ago
- C++ function that will automagically unhook a specified Windows API☆62Updated 5 years ago
- ☆23Updated 3 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Updated 3 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- ☆43Updated 3 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- ☆101Updated 4 years ago