Capcom Rootkit POC
☆208Mar 5, 2017Updated 8 years ago
Alternatives and similar repositories for Capcom-Rootkit
Users that are interested in Capcom-Rootkit are comparing it to the libraries listed below
Sorting:
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆161Jun 14, 2018Updated 7 years ago
- This is a standalone exploit for a vulnerable feature in Capcom.sys☆324Sep 18, 2022Updated 3 years ago
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 7 years ago
- getsystem via parent process using ps1 & embeded c#☆467Oct 26, 2023Updated 2 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆426Jul 29, 2013Updated 12 years ago
- ☆142Apr 21, 2017Updated 8 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆229Feb 20, 2020Updated 6 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆402Jun 6, 2020Updated 5 years ago
- Token Privilege Research☆872Sep 1, 2017Updated 8 years ago
- ☆408Mar 1, 2017Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,992Oct 10, 2018Updated 7 years ago
- Tool to extract Kerberos tickets from Linux kernel keys.☆238May 28, 2019Updated 6 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- SharpDPAPI is a C# port of some Mimikatz DPAPI functionality.☆1,391Jun 27, 2024Updated last year
- My musings with PowerShell☆2,703Nov 19, 2021Updated 4 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- PowerShell Scripts I find useful☆776May 18, 2016Updated 9 years ago
- Elevation of privilege detector based on HyperPlatform☆123Mar 5, 2017Updated 8 years ago
- UAC 0day, all day!☆281Jul 30, 2017Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,503Nov 15, 2023Updated 2 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,128Feb 10, 2021Updated 5 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI☆42Feb 13, 2017Updated 9 years ago
- SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GP…☆1,302Dec 15, 2020Updated 5 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,913Nov 19, 2025Updated 3 months ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆430Aug 22, 2023Updated 2 years ago
- Run PowerShell command without invoking powershell.exe☆1,532Mar 23, 2023Updated 2 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆325Apr 26, 2020Updated 5 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆504Oct 8, 2017Updated 8 years ago