PN-Tester / AppxPotatoLinks
AppX RPC Local Privilege Escalation - Windows 10/11
☆91Updated 2 years ago
Alternatives and similar repositories for AppxPotato
Users that are interested in AppxPotato are comparing it to the libraries listed below
Sorting:
- Silently Install Chrome Extension For Persistence☆97Updated last year
- CVE-2024-35250 的 Beacon Object File (BOF) 实现。☆24Updated last year
- VBS-Obfuscator-GO is a Go-based tool designed for obfuscating VBScript (VBS) files. It transforms readable VBScript code into a less reco…☆38Updated 9 months ago
- Shellcode Reductio Entropy Tools☆74Updated 2 years ago
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆90Updated 2 years ago
- vehsyscall:a syscall project that may bypass EDR☆61Updated last year
- Bypass YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.☆52Updated 4 months ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆78Updated last year
- Evasive loader to bypass static detection☆59Updated 2 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆187Updated 6 months ago
- can convert EXE/DLL into position-independent shellcode☆40Updated last week
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆58Updated last year
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆43Updated 8 months ago
- Self Cleanup in post-ex job☆59Updated last year
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆64Updated 2 years ago
- A Simple PoC☆22Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆69Updated 4 months ago
- ☆28Updated 2 years ago
- Help red teams find opsec processes during engagements☆42Updated last year
- BOF to run PE in Cobalt Strike Beacon without console creation☆184Updated 2 months ago
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆135Updated 6 months ago
- A tool written in golang which compress using UPX and patch it with the provided PE file to make "UPX -d" flag impossible to decompress a…☆28Updated last year
- A Python-based VBScript Code Obfuscator☆44Updated 2 months ago
- ☆44Updated 2 years ago
- ASPX ShellCode Loader☆54Updated 2 years ago
- CVE-2023-21707 EXP☆28Updated 2 years ago
- Use COM Component Bypass UAC,Dll Version☆36Updated 4 years ago
- A BOF/COFF loader implemented in Go and CGO.☆23Updated 2 years ago
- kill AV/EDR☆21Updated 2 years ago