FourCoreLabs / TrustedInstallerPOCLinks
A simple go Proof of Concept to start a new shell as TrustedInstaller
☆63Updated 2 years ago
Alternatives and similar repositories for TrustedInstallerPOC
Users that are interested in TrustedInstallerPOC are comparing it to the libraries listed below
Sorting:
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆260Updated 3 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 8 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆53Updated 2 years ago
- Nim process hollowing loader☆62Updated 5 months ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- ☆41Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 2 years ago
- UAC Bypass using CMSTP in Rust☆35Updated last year
- Advanced dynamic malware analysis tool.☆82Updated last year
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Updated 3 years ago
- A Repository to Track Anti-Forensic Techniques☆117Updated 2 years ago
- a small wiper malware programmed in c#☆59Updated 3 years ago
- A POC to disable TamperProtection and other Defender / MDE components☆252Updated last year
- A command and control framework.☆54Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Updated last month
- ☆119Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- ☆107Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Updated 2 years ago
- Analyse MSI files for vulnerabilities☆140Updated last year
- The best powershell obfuscator ever made☆119Updated 5 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆137Updated 2 years ago
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆55Updated 2 years ago
- Inject shellcode into a valid BMP/GIF image.☆32Updated 5 years ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆150Updated last year
- Spoofing desktop login applications with WinForms and WPF☆176Updated last year
- ☆26Updated 10 months ago