Leo4j / Invoke-RunAsSystemLinks
A simple script to elevate current session to SYSTEM (needs to be run as Administrator)
☆14Updated 8 months ago
Alternatives and similar repositories for Invoke-RunAsSystem
Users that are interested in Invoke-RunAsSystem are comparing it to the libraries listed below
Sorting:
- A .NET binary loader that bypasses AMSI☆46Updated 3 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated 2 years ago
- ☆30Updated 4 years ago
- A simple PE loader.☆26Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆30Updated last month
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆15Updated 4 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆22Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆36Updated 4 years ago
- Remove API hooks from a Beacon process.☆14Updated 3 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Updated 4 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 3 years ago
- A C# port of the MinHook API hooking library☆56Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Deobfuscation of XorStringsNet☆14Updated 9 months ago
- Extracting Syscall Stub, Modernized☆65Updated 3 years ago
- Another AMSI bypass - but in C++.☆23Updated 2 years ago
- ☆36Updated last year
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- RDPThief donut shellcode inject into mstsc☆88Updated 4 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago