Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled Tasks.
☆90Jan 24, 2026Updated 2 months ago
Alternatives and similar repositories for AudioDG.exe-DLL-Hijacking-for-LPE
Users that are interested in AudioDG.exe-DLL-Hijacking-for-LPE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- ☆47Dec 28, 2025Updated 3 months ago
- Updated version of a long known self deletion technique to work with 24H2.☆61Jun 9, 2025Updated 9 months ago
- A Cobalt Strike RL built with Crystal Palace — module overloading, NtContinue entry transfer, call stack spoofing, sleep masking, and sta…☆164Mar 15, 2026Updated 2 weeks ago
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆292Feb 2, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆132Sep 4, 2025Updated 6 months ago
- Client-side Encrypted Upload Server Python Script☆67Jul 10, 2025Updated 8 months ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆32Jan 27, 2026Updated 2 months ago
- ☆19Sep 17, 2025Updated 6 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆66Jan 5, 2026Updated 2 months ago
- ☆61Oct 24, 2025Updated 5 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆72Dec 26, 2025Updated 3 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆27Aug 20, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A stager and implant that executes remote Web Assembly☆60Feb 4, 2026Updated last month
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading …☆151Feb 14, 2026Updated last month
- ☆234Oct 8, 2024Updated last year
- Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.☆186Dec 23, 2025Updated 3 months ago
- AppLocker-Based EDR Neutralization☆327Dec 19, 2025Updated 3 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆108Aug 18, 2025Updated 7 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆125Jul 11, 2025Updated 8 months ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆46Feb 24, 2026Updated last month
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The DCERPC only printerbug.py version☆213Oct 30, 2025Updated 4 months ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- Shellcode injection using the Windows Debugging API☆177Jan 4, 2026Updated 2 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 9 months ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption☆211Dec 17, 2025Updated 3 months ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆71Mar 8, 2026Updated 3 weeks ago
- Beacon Object File (BOF) to obtain Entra tokens via authcode flow.☆124Jan 17, 2026Updated 2 months ago
- Umbrella will protect your shellcode from the rain.☆31Jun 4, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆233Jan 20, 2024Updated 2 years ago
- AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 · x64 · x86 · WoW64 · ARM64☆379Mar 7, 2026Updated 3 weeks ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆281Updated this week
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Extracting NetNTLM without touching lsass.exe☆244Nov 27, 2023Updated 2 years ago
- Library of BOFs to interact with SQL servers☆23Apr 9, 2025Updated 11 months ago