☆52Feb 27, 2017Updated 9 years ago
Alternatives and similar repositories for Token-Stealing-Shellcode
Users that are interested in Token-Stealing-Shellcode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Mar 20, 2017Updated 9 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 9 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- Using SEH to bypass CFG☆29Mar 28, 2017Updated 9 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Content from presentation at BHUSA 2017☆178Jul 27, 2017Updated 8 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 9 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Jul 30, 2017Updated 8 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Jan 19, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/bypass-x64-dse☆21Oct 1, 2015Updated 10 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆94Sep 19, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- windows kernel vulnerability found by me☆88Aug 28, 2017Updated 8 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆49Jun 27, 2016Updated 9 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆77Aug 12, 2015Updated 10 years ago
- Trigger and exploit code for CVE-2014-4113☆41Feb 14, 2016Updated 10 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆31May 8, 2015Updated 11 years ago
- FLARE Kernel Shellcode Loader☆177May 3, 2019Updated 7 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆119Nov 6, 2024Updated last year
- Windows Software Exploitation☆136Feb 14, 2017Updated 9 years ago
- ☆24Feb 19, 2017Updated 9 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- ☆28Nov 20, 2025Updated 5 months ago
- ☆11Oct 5, 2019Updated 6 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 10 years ago
- Exploit primitives for PowerShell☆435Mar 25, 2018Updated 8 years ago
- An alternative tool to Sysinternals WinObj tool (nicer icons!)☆35Aug 31, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Examples of leaking Kernel Mode information from User Mode on Windows☆639Jul 7, 2017Updated 8 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Broken web app intentionally built with pentesting obstacles☆16Jun 21, 2019Updated 6 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 3 years ago
- ROP based Movfuscator VM☆31Nov 3, 2016Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 9 years ago