S12cybersecurity / PrivilegeEscalationClass
C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin
☆16Updated last year
Related projects: ⓘ
- Experiment with d_olex's firmware and conducting "preboot" attack☆15Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆19Updated 10 months ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- ☆12Updated this week
- Utilizing Alternative Shellcode Execution Via Callbacks☆12Updated 9 months ago
- Process injection via KernelCallbackTable☆14Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated 10 months ago
- ☆13Updated this week
- ☆14Updated last year
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆13Updated last year
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Updated 3 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- Windows Malware Probe of Concept☆20Updated 2 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 5 years ago
- Cross-platform malware development library for anti-analysis techniques☆23Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆29Updated 4 years ago
- ☆12Updated 2 years ago
- ☆23Updated 10 months ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆12Updated 2 years ago
- Dangling COM Keys Finder☆14Updated 2 years ago
- One gate to all syscalls!☆23Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 10 months ago
- ☆17Updated last year
- Using Thread Description To Hide Shellcodes☆13Updated 2 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆20Updated 11 months ago
- Collection of shellcode injection and execution techniques☆17Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- ☆22Updated this week