HadiMed / NT-SYSTEMLinks
Tool to get NT system shell .
☆11Updated 4 years ago
Alternatives and similar repositories for NT-SYSTEM
Users that are interested in NT-SYSTEM are comparing it to the libraries listed below
Sorting:
- Tool to get NT system shell .☆24Updated 4 years ago
- ☆52Updated 5 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Updated 3 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 4 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Updated 5 years ago
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆60Updated 3 years ago
- DPX - the Doge Packer for eXecutables☆29Updated 3 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- Beacon Object Files.☆37Updated last year
- A standalone WMI protocol for CrackMapExec☆51Updated 5 years ago
- transmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV☆49Updated 4 years ago
- ☆28Updated 3 years ago
- MSBuild AL bypass☆17Updated 2 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 4 years ago
- ☆47Updated 7 months ago
- EDR Evasion - Combination of SwampThing - TikiTorch☆28Updated 5 years ago
- Hijack Printconfig.dll to execute shellcode☆99Updated 4 years ago
- Alternative Mimikatz LSASS DUMPER☆14Updated 5 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Updated 3 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 4 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆61Updated 4 years ago
- Terminate the eventlog thread to disable the windows eventlog☆21Updated 5 years ago
- ☆18Updated 4 years ago
- Windows 7/2008 R2 EoP☆13Updated 4 years ago
- C# implementation of the research by @jonaslyk and the drafted PoC from @LloydLabs☆150Updated 4 years ago
- not an exploit or a poc☆16Updated 3 years ago
- Use current thread token to execute command☆15Updated 4 years ago
- Ntdll Unhooking POC☆19Updated 3 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 3 years ago