FourCoreLabs / TrustedInstallerPOCLinks
A simple go Proof of Concept to start a new shell as TrustedInstaller
☆63Updated 2 years ago
Alternatives and similar repositories for TrustedInstallerPOC
Users that are interested in TrustedInstallerPOC are comparing it to the libraries listed below
Sorting:
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆54Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- Nim process hollowing loader☆62Updated 6 months ago
- A command and control framework.☆54Updated last year
- The code I write in my blog☆51Updated last week
- A POC to disable TamperProtection and other Defender / MDE components☆253Updated last year
- ☆107Updated 2 years ago
- ☆25Updated 10 months ago
- ☆108Updated last year
- ☆41Updated last year
- Spoofing desktop login applications with WinForms and WPF☆176Updated last year
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆56Updated 2 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated last year
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆34Updated last year
- A collection of PoCs to do common things in unconventional ways☆122Updated 5 months ago
- ☆120Updated 2 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆62Updated 2 years ago
- Advanced dynamic malware analysis tool.☆82Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Updated 2 months ago
- The best powershell obfuscator ever made☆119Updated 6 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆161Updated 5 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- ☆144Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 10 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Updated 2 years ago