A simple go Proof of Concept to start a new shell as TrustedInstaller
☆62Sep 11, 2023Updated 2 years ago
Alternatives and similar repositories for TrustedInstallerPOC
Users that are interested in TrustedInstallerPOC are comparing it to the libraries listed below
Sorting:
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Simple HTTP listener for security testing☆20Oct 7, 2022Updated 3 years ago
- Heappo 🦛 is a PyKD based extensions for WinDBG which aids Heap Exploitation☆14Mar 25, 2020Updated 5 years ago
- Run a program as TrustedInstaller (SYSTEM)☆217Apr 17, 2025Updated 11 months ago
- Scan vulnerable drivers on Windows with loldrivers.io☆188Sep 11, 2023Updated 2 years ago
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 5 months ago
- Multitool for Windows native find + replace bytes in hex format☆16Jan 22, 2026Updated 2 months ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Mar 13, 2022Updated 4 years ago
- Deleting Shadow Copies In Pure C++☆118Oct 31, 2022Updated 3 years ago
- A Windows command-line utility and Explorer extension to run programs with TrustedInstaller privileges.☆26Nov 23, 2024Updated last year
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- ☆33Jan 23, 2025Updated last year
- simple discord webhook protector can be hosted anywhere easly☆13Jun 26, 2023Updated 2 years ago
- Runtime smm module loader☆37Jan 12, 2023Updated 3 years ago
- Retrieve inner payloads from Donut samples☆123Mar 12, 2026Updated last week
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- Bookmarklet to find endpoints easily with one click☆79May 19, 2024Updated last year
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆109Jan 17, 2024Updated 2 years ago
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- ☆18Jun 12, 2025Updated 9 months ago
- ☆17Dec 16, 2021Updated 4 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Auditing Hooks for https://github.com/jborean93/PSDetour☆13Apr 29, 2025Updated 10 months ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated 2 years ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Oct 24, 2023Updated 2 years ago
- ☆18May 6, 2023Updated 2 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Competition Infrastructure Management☆13Oct 16, 2025Updated 5 months ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆70Feb 25, 2026Updated 3 weeks ago
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆14Oct 17, 2023Updated 2 years ago
- Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527☆19Jul 12, 2021Updated 4 years ago