RythmStick / CVE-2019-1064Links
CVE-2019-1064 Local Privilege Escalation Vulnerability
☆26Updated 6 years ago
Alternatives and similar repositories for CVE-2019-1064
Users that are interested in CVE-2019-1064 are comparing it to the libraries listed below
Sorting:
- External C2 Using IE COM Objects☆102Updated 6 years ago
- Bypass AMSI and Defender using Ordinal Values☆41Updated 5 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 6 years ago
- A quick tool for hiding a new process running shellcode.☆58Updated 5 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Updated 5 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated 2 years ago
- Aggressor Script to Execute Assemblies from Github☆70Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- ☆54Updated 6 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 6 years ago
- Initial Commit of Coresploit☆57Updated 4 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Updated 5 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Updated 6 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆62Updated 6 years ago
- WMI Event Subscription Persistence in C#☆112Updated 6 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Updated 5 years ago
- C# .NET Assembly for interacting with File Object DACLs☆46Updated 5 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Updated 8 years ago
- Suite of Shellcode Running Utilities☆114Updated 5 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆67Updated 5 years ago
- Contains poc's and my research works☆31Updated 2 years ago
- ☆36Updated 6 years ago
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆93Updated 4 years ago
- .Net Assembly to block ETW telemetry in current process☆81Updated 5 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Updated 5 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Updated 6 years ago
- ☆50Updated 5 years ago