Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled Tasks.
☆92Jan 24, 2026Updated 3 months ago
Alternatives and similar repositories for AudioDG.exe-DLL-Hijacking-for-LPE
Users that are interested in AudioDG.exe-DLL-Hijacking-for-LPE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Apr 23, 2026Updated 2 weeks ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 4 months ago
- ☆48Dec 28, 2025Updated 4 months ago
- Updated version of a long known self deletion technique to work with 24H2.☆62Jun 9, 2025Updated 11 months ago
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆322Feb 2, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆203Mar 15, 2026Updated last month
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆139Apr 6, 2026Updated last month
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 9 months ago
- ☆19Sep 17, 2025Updated 7 months ago
- ☆61Oct 24, 2025Updated 6 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆69Jan 5, 2026Updated 4 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆74Dec 26, 2025Updated 4 months ago
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆127Mar 30, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- POC for CVE-2024-3183 (FreeIPA Rosting)☆29Aug 20, 2024Updated last year
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 3 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆160Feb 14, 2026Updated 2 months ago
- ☆235Oct 8, 2024Updated last year
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆367Apr 18, 2026Updated 2 weeks ago
- AppLocker-Based EDR Neutralization☆336Dec 19, 2025Updated 4 months ago
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.☆193Dec 23, 2025Updated 4 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆114Apr 28, 2026Updated last week
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆127Jul 11, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated 2 months ago
- Misery Loader to bypass modern EDR solutions☆19Dec 20, 2024Updated last year
- Shellcode injection using the Windows Debugging API☆178Jan 4, 2026Updated 4 months ago
- The DCERPC only printerbug.py version☆219Oct 30, 2025Updated 6 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 11 months ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆129Jan 17, 2026Updated 3 months ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆72Mar 8, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Umbrella will protect your shellcode from the rain.☆30Jun 4, 2025Updated 11 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆22Nov 19, 2025Updated 5 months ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆240Jan 20, 2024Updated 2 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆221Dec 17, 2025Updated 4 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆300Updated this week
- Extracting NetNTLM without touching lsass.exe☆244Nov 27, 2023Updated 2 years ago