SleepTheGod / Windows
Windows And Ways To Break It
☆100Updated last year
Alternatives and similar repositories for Windows:
Users that are interested in Windows are comparing it to the libraries listed below
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆67Updated 5 months ago
- A C2 framework built for my bachelors thesis☆56Updated 3 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆49Updated 5 months ago
- ☆101Updated 5 months ago
- A collection of tools that I use in CTF's or for assessments☆89Updated last week
- A shellcode injection tool showcasing various process injection techniques☆135Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆106Updated last year
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆93Updated last year
- ☆57Updated 10 months ago
- Persistent Powershell backdoor tool {😈}☆111Updated 6 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆60Updated 5 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆86Updated 6 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆150Updated 9 months ago
- ☆125Updated 6 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆173Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 7 months ago
- Jasmin ransomware web panel path traversal PoC☆21Updated 10 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 5 months ago
- Our Tips&Tricks☆71Updated last week
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆56Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆159Updated 11 months ago
- ☆58Updated 4 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆73Updated 3 months ago
- ☆107Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆65Updated last year
- Red Team Guides☆135Updated last year
- Create and enumerate hidden desktops.☆90Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 2 years ago