Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled Tasks.
☆89Jan 24, 2026Updated last month
Alternatives and similar repositories for AudioDG.exe-DLL-Hijacking-for-LPE
Users that are interested in AudioDG.exe-DLL-Hijacking-for-LPE are comparing it to the libraries listed below
Sorting:
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆31Jan 27, 2026Updated last month
- A stager and implant that executes remote Web Assembly☆37Feb 4, 2026Updated last month
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆132Sep 4, 2025Updated 6 months ago
- ☆19Sep 17, 2025Updated 5 months ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 9 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆21Nov 28, 2025Updated 3 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Umbrella will protect your shellcode from the rain.☆31Jun 4, 2025Updated 9 months ago
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆286Feb 2, 2026Updated last month
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- Library of BOFs to interact with SQL servers☆23Apr 9, 2025Updated 11 months ago
- ☆47Dec 28, 2025Updated 2 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆44Feb 24, 2026Updated last week
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆68Feb 3, 2026Updated last month
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- ☆61Oct 24, 2025Updated 4 months ago
- Dump SourceGuardian-protected PHP 5.4 files with VLD.☆27Nov 29, 2022Updated 3 years ago
- Minimal header-only C++11 argument parser library for simple command line tools.☆25Feb 2, 2025Updated last year
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 7 months ago
- POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interact…☆52Oct 16, 2025Updated 4 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆123Jul 11, 2025Updated 7 months ago
- Dump Kerberos tickets☆45Aug 4, 2025Updated 7 months ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆39Sep 23, 2023Updated 2 years ago
- vulnlab.com reaper writeup☆27Aug 30, 2023Updated 2 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆27Aug 20, 2024Updated last year
- TypeLib persistence technique☆140Oct 22, 2024Updated last year
- Agent for AdaptixC2 with focus in evasion, capability and malleable.☆165Mar 1, 2026Updated last week
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆157Nov 23, 2025Updated 3 months ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆204Dec 17, 2025Updated 2 months ago
- Shellcode injection using the Windows Debugging API☆171Jan 4, 2026Updated 2 months ago
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆71Dec 26, 2025Updated 2 months ago
- ☆59Feb 19, 2026Updated 2 weeks ago
- A PoC for the dMSA Active Directory Domain Takeover deemed BadSuccessor☆50Jul 20, 2025Updated 7 months ago
- Extract the SAM and SYSTEM hives using the Volume Shadow Copy (VSS) API. With exfiltration and XOR obfuscation options. Implemented in C#…☆341Feb 2, 2026Updated last month
- Malware?☆77Oct 26, 2025Updated 4 months ago
- GPS Tracker ,基于GPS、北斗的定位器,用于车辆、宠物、老人等需要定位追踪的场景☆24May 23, 2025Updated 9 months ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆229Jan 20, 2024Updated 2 years ago