Kiosec / Windows-ExploitationLinks
Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.
☆17Updated 5 months ago
Alternatives and similar repositories for Windows-Exploitation
Users that are interested in Windows-Exploitation are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆57Updated 3 weeks ago
- A collection of Cobalt Strike Aggressor scripts.☆110Updated 4 years ago
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- Malicious powershell scripts loader designed to avoid detection.☆61Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- SeRestorePrivilege to SYSTEM☆133Updated 4 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 4 years ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Updated 2 years ago
- ☆75Updated 10 months ago
- AV Evasion Techniques☆83Updated 3 years ago
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- A repository with my code snippets for research/education purposes.☆52Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Updated 6 months ago
- C# tool to identify and exploit weaknesses within MSSQL instances in Active Directory environments☆113Updated 3 years ago
- C# havoc implant☆100Updated 2 years ago
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- ☆27Updated 2 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆119Updated 3 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- ☆59Updated last year
- Inject RDPThief into memory with PowerShell.☆65Updated last year
- Windows Privilege Escalation☆70Updated 3 years ago
- ☆63Updated 2 years ago
- execute PE in memory Filelessly☆50Updated last year
- ☆96Updated last year
- SeManageVolumePrivilege to SYSTEM☆146Updated 2 years ago
- .bin file to shellcode convertor☆39Updated last year