Kiosec / Windows-ExploitationLinks
Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.
☆8Updated last month
Alternatives and similar repositories for Windows-Exploitation
Users that are interested in Windows-Exploitation are comparing it to the libraries listed below
Sorting:
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ☆27Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆56Updated 6 months ago
- ☆19Updated last year
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆38Updated 11 months ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆38Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆66Updated last month
- Simple Shellcode Loader tool☆26Updated last year
- PowerShell script to generate ShellCode in various formats☆42Updated 8 months ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆19Updated 2 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆60Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated 2 years ago
- Create Anti-Copy DRM Malware☆57Updated 9 months ago
- Do some DLL SideLoading magic☆84Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- A collection of PoCs for different injection techniques on Windows!☆43Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated last year
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated last year
- A small red team course☆39Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated 2 years ago
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆55Updated 7 months ago
- .bin file to shellcode convertor☆37Updated 11 months ago