MzHmO / Privileger
Privileger is a tool to work with Windows Privileges
☆136Updated last year
Alternatives and similar repositories for Privileger:
Users that are interested in Privileger are comparing it to the libraries listed below
- My implementation of the GIUDA project in C++☆167Updated last year
- ☆164Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆96Updated last year
- random code snippets, useful for getting started☆115Updated 2 months ago
- Amazing whoami alternatives☆138Updated 10 months ago
- Run Your Payload Without Running Your Payload☆179Updated 2 years ago
- ☆131Updated this week
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆193Updated 7 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.☆229Updated last year
- Weaponized HellsGate/SigFlip☆198Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆216Updated last month
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆141Updated 6 months ago
- Extracting NetNTLM without touching lsass.exe☆233Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆152Updated 8 months ago
- Evasive Golang Loader☆132Updated 6 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆180Updated last year
- Execute shellcode files with rundll32☆191Updated last year
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆173Updated 10 months ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆166Updated 2 months ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆177Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated 10 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆143Updated 8 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆161Updated last year
- ☆146Updated last year
- ☆120Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆84Updated 7 months ago
- Windows Kernel Offensive Toolset☆117Updated 4 months ago
- PE obfuscator with Evasion in mind☆213Updated last year
- An App Domain Manager Injection DLL PoC on steroids☆164Updated last year