FourCoreLabs / TrustedInstallerPOCLinks
A simple go Proof of Concept to start a new shell as TrustedInstaller
☆60Updated 2 years ago
Alternatives and similar repositories for TrustedInstallerPOC
Users that are interested in TrustedInstallerPOC are comparing it to the libraries listed below
Sorting:
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆139Updated 9 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 6 months ago
- A POC to disable TamperProtection and other Defender / MDE components☆229Updated last year
- Nim process hollowing loader☆60Updated 3 months ago
- Create and enumerate hidden desktops.☆88Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆100Updated 7 months ago
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆47Updated last year
- The best powershell obfuscator ever made☆112Updated 3 months ago
- A command and control framework.☆55Updated 10 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆85Updated 6 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆54Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆67Updated 10 months ago
- ☆41Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆102Updated 5 months ago
- ☆119Updated last year
- execute PE in memory Filelessly☆47Updated 8 months ago
- A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.☆41Updated last year
- Yet another shellcode loader - but a sneaky one☆24Updated 6 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆250Updated last month
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆57Updated last month
- ☆26Updated 7 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- ☆40Updated last year
- ☆107Updated 2 years ago
- macos stealer poc☆126Updated 3 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated last year
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year