S12cybersecurity / WinDefenderKiller
Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys
☆405Updated last year
Related projects: ⓘ
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆468Updated last month
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆403Updated 2 months ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆277Updated 8 months ago
- ☆474Updated 5 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆485Updated last month
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆302Updated last month
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆378Updated last year
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆218Updated 3 months ago
- ☆231Updated this week
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆148Updated 7 months ago
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆289Updated 2 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆232Updated last year
- Harvest passwords automatically from OpenSSH server☆342Updated last year
- Amazing whoami alternatives☆134Updated 5 months ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆360Updated 2 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆465Updated 2 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆127Updated last week
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆344Updated 8 months ago
- Ask a TGS on behalf of another user without password☆456Updated last month
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆147Updated 2 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆439Updated 3 months ago
- yet another AV killer tool using BYOVD☆259Updated 9 months ago
- Extract C2 Traffic☆242Updated 4 months ago
- A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities☆504Updated 2 weeks ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆378Updated 11 months ago
- Privileger is a tool to work with Windows Privileges☆131Updated last year
- Collection of UAC Bypass Techniques Weaponized as BOFs☆380Updated 6 months ago
- A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs.☆459Updated 10 months ago
- ☆181Updated 7 months ago