EvilBytecode / Enable-All-TokensLinks
Enable-All-Tokens is a Go-based project designed to adjust and enable a list of specified privileges for the current process token on a Windows operating system. This project can be particularly useful for developers and system administrators who need to programmatically enable various system privileges for their applications.
☆10Updated 2 months ago
Alternatives and similar repositories for Enable-All-Tokens
Users that are interested in Enable-All-Tokens are comparing it to the libraries listed below
Sorting:
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Updated 3 years ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆35Updated last month
- BOF/COFF obj file to PIC(shellcode). by golang☆39Updated 2 years ago
- PoC for a Havoc agent/handler setup with all C2 traffic routed through GitHub. No direct connections: all commands and responses are rela…☆36Updated last week
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- Beacon Object Files.☆35Updated last year
- Reflective DLL injection Execution☆19Updated 2 years ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆17Updated last month
- ☆15Updated 2 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- Ntdll Unhooking POC☆19Updated 2 years ago
- DLL Unhooking☆12Updated 4 years ago
- Thanks to @d35ha☆13Updated 3 years ago
- Some anti-sandbox techniques implemented in Golang.☆11Updated last year
- Savoir is a tool to perform tasks during internal security assessment☆19Updated 3 years ago
- ☆18Updated 3 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆32Updated last year
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆45Updated 3 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆34Updated 4 months ago
- x64 version☆36Updated 3 years ago
- ☆43Updated 2 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- BypassCredGuard CS BOF☆42Updated 5 months ago
- ☆13Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆11Updated 10 months ago
- This project is created for research into antivirus evasion by unhooking.☆15Updated 3 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆46Updated 2 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Updated last year
- Beacon Object File (BOF) Template☆51Updated 8 months ago