A simple go Proof of Concept to start a new shell as TrustedInstaller
☆65Sep 11, 2023Updated 2 years ago
Alternatives and similar repositories for TrustedInstallerPOC
Users that are interested in TrustedInstallerPOC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Testing POC for use cases☆26Nov 24, 2024Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Simple HTTP listener for security testing☆21Oct 7, 2022Updated 3 years ago
- Heappo 🦛 is a PyKD based extensions for WinDBG which aids Heap Exploitation☆14Mar 25, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Run a program as TrustedInstaller (SYSTEM)☆218Apr 17, 2025Updated 11 months ago
- Scan vulnerable drivers on Windows with loldrivers.io☆188Sep 11, 2023Updated 2 years ago
- An example of an external LLVM plugin module transform pass for the latest versions.☆15Oct 21, 2025Updated 5 months ago
- Multitool for Windows native find + replace bytes in hex format☆18Jan 22, 2026Updated 2 months ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆31Mar 13, 2022Updated 4 years ago
- Deleting Shadow Copies In Pure C++☆120Oct 31, 2022Updated 3 years ago
- A Windows command-line utility and Explorer extension to run programs with TrustedInstaller privileges.☆25Nov 23, 2024Updated last year
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆35Jan 23, 2025Updated last year
- simple discord webhook protector can be hosted anywhere easly☆13Jun 26, 2023Updated 2 years ago
- Runtime smm module loader☆38Jan 12, 2023Updated 3 years ago
- Retrieve inner payloads from Donut samples☆125Mar 12, 2026Updated last month
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- Bookmarklet to find endpoints easily with one click☆80May 19, 2024Updated last year
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆110Jan 17, 2024Updated 2 years ago
- Remake of CVE-2020-9484 by Pentestical☆24Sep 16, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆18Jun 12, 2025Updated 10 months ago
- ☆17Dec 16, 2021Updated 4 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- Auditing Hooks for https://github.com/jborean93/PSDetour☆13Mar 25, 2026Updated 2 weeks ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated 2 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆18May 6, 2023Updated 2 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆19Jun 9, 2013Updated 12 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 5 months ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 2 months ago
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆14Oct 17, 2023Updated 2 years ago
- ☆10Mar 24, 2024Updated 2 years ago