FourCoreLabs / TrustedInstallerPOCLinks
A simple go Proof of Concept to start a new shell as TrustedInstaller
☆63Updated 2 years ago
Alternatives and similar repositories for TrustedInstallerPOC
Users that are interested in TrustedInstallerPOC are comparing it to the libraries listed below
Sorting:
- Nim process hollowing loader☆62Updated 6 months ago
- A POC to disable TamperProtection and other Defender / MDE components☆253Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 9 months ago
- ☆120Updated 2 years ago
- ☆41Updated last year
- The best powershell obfuscator ever made☆120Updated 6 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆137Updated this week
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆54Updated 2 years ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆152Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- ☆107Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆91Updated 9 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- ☆144Updated last year
- A command and control framework.☆54Updated last year
- ☆133Updated 2 years ago
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Updated 2 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆260Updated this week
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆60Updated 4 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- a small wiper malware programmed in c#☆59Updated 3 years ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated 2 years ago
- Analyse MSI files for vulnerabilities☆143Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated last year
- ☆25Updated 10 months ago
- The code I write in my blog☆62Updated last week
- Comprehensive Windows Syscall Extraction & Analysis Framework☆161Updated 5 months ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago