FourCoreLabs / TrustedInstallerPOC
A simple go Proof of Concept to start a new shell as TrustedInstaller
☆52Updated last year
Alternatives and similar repositories for TrustedInstallerPOC:
Users that are interested in TrustedInstallerPOC are comparing it to the libraries listed below
- A POC to disable TamperProtection and other Defender / MDE components☆194Updated 7 months ago
- Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode☆57Updated 3 months ago
- ☆106Updated last year
- Create and enumerate hidden desktops.☆89Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆53Updated 6 months ago
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆34Updated last year
- Nim process hollowing loader☆49Updated 5 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆92Updated last week
- PowerShell script to generate ShellCode in various formats☆41Updated 3 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 10 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆68Updated 5 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆84Updated 6 months ago
- Recursive Loader☆102Updated 3 months ago
- Powershell UAC Bypass script leveraging WinSAT.exe☆14Updated 3 years ago
- ☆136Updated 5 months ago
- Utilities for obfuscating shellcode☆49Updated 6 months ago
- UAC Bypass using CMSTP in Rust☆22Updated last month
- Lifetime AMSI bypass.☆35Updated 6 months ago
- A Mythic Agent written in PIC C.☆167Updated last week
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 7 months ago
- Just another C2 Redirector using CloudFlare.☆82Updated 8 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆37Updated 8 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆96Updated last year
- ☆112Updated 11 months ago
- ☆29Updated last year
- .bin file to shellcode convertor☆31Updated 6 months ago
- ☆39Updated 10 months ago