Leo4j / Invoke-RunAsSystemLinks
A simple script to elevate current session to SYSTEM (needs to be run as Administrator)
☆15Updated last year
Alternatives and similar repositories for Invoke-RunAsSystem
Users that are interested in Invoke-RunAsSystem are comparing it to the libraries listed below
Sorting:
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Updated 2 years ago
- A simple PE loader.☆27Updated 3 years ago
- A .NET binary loader that bypasses AMSI☆45Updated 4 years ago
- ☆61Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- Inject shellcode into a valid BMP/GIF image.☆32Updated 5 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 3 years ago
- ☆36Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Updated last month
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆24Updated 2 years ago
- A port of classic netcat to C#☆34Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- Golang Implementation of Hell's gate☆21Updated 2 years ago
- Deobfuscation of XorStringsNet☆14Updated last year
- C# project to Reflectively load .Net assemblies in memory☆19Updated last year
- ☆31Updated 5 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆17Updated 6 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆99Updated last year
- ☆20Updated last year