Q4n / SuperPriv
从admin冲到TrustedInstaller
☆17Updated last year
Related projects ⓘ
Alternatives and complementary repositories for SuperPriv
- Open-source EDR kernel-component for system monitoring and DLL injection☆30Updated 3 years ago
- ☆40Updated 2 years ago
- POC For CVE-2022-24483☆14Updated 2 years ago
- A kernel mode Windows rootkit in development.☆49Updated 2 years ago
- Process Hollowing Packer☆25Updated 7 years ago
- ☆12Updated 2 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆20Updated 2 years ago
- Kernel file/process/object tool☆64Updated 3 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- Windows NTLMSSP library☆10Updated 4 years ago
- 参考taviso的代码逆向一下mpengine.dll☆19Updated 2 years ago
- ☆15Updated 4 years ago
- ☆9Updated 8 months ago
- SyscallLoader☆9Updated 3 years ago
- ☆26Updated 2 years ago
- Files for http://deniable.org/windows/windows-callbacks☆24Updated 4 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆41Updated 3 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆22Updated 4 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆32Updated last year
- Proofs-Of-360Security Sandbox Escape☆10Updated 2 years ago
- This is a project to receive Base64 data and decode it in process☆14Updated 4 years ago
- ☆10Updated 2 years ago
- ☆20Updated 4 years ago
- ☆11Updated 2 years ago
- ksc4cpp is a shellcode framework for windows kernel based on C++☆21Updated last year
- A PoC tool for exploiting leaked process and thread handles☆30Updated 8 months ago