S12cybersecurity / PrivilegeEscalationClass
C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin
☆19Updated last year
Alternatives and similar repositories for PrivilegeEscalationClass:
Users that are interested in PrivilegeEscalationClass are comparing it to the libraries listed below
- Another Portable Executable files analysing stuff☆20Updated 13 years ago
- Process injection via KernelCallbackTable☆13Updated 3 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 2 months ago
- ☆15Updated last year
- TaskMgr Volatile Environment LPE☆13Updated 2 months ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆13Updated last year
- Seven different DLL injection techniques in one single project.☆10Updated 4 years ago
- A custom SentinelOne USB scanner.☆18Updated 2 years ago
- Component Services Volatile Environment LPE☆11Updated 2 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆18Updated 2 weeks ago
- Sources Codes of many MSIL malwares☆23Updated 2 years ago
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Implementation of ITaskHandler in C++☆13Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆18Updated last year
- Dangling COM Keys Finder☆17Updated 3 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- Display Languages Volatile Environment LPE☆10Updated 2 months ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 3 months ago
- A simple PE loader.☆25Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- Collection of IDA helpers☆15Updated 2 years ago
- Decrypt Wireless Passwords On Windows☆13Updated 4 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago