SleepTheGod / WindowsLinks
Windows And Ways To Break It
☆100Updated 2 years ago
Alternatives and similar repositories for Windows
Users that are interested in Windows are comparing it to the libraries listed below
Sorting:
- ☆143Updated last month
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 11 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆83Updated last year
- ☆95Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- ☆106Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 10 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Updated 2 years ago
- Basic reverse shell in C using socket() with complete explanation☆68Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆102Updated last month
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆145Updated 2 years ago
- A C2 framework built for my bachelors thesis☆56Updated 2 weeks ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- ☆107Updated 2 years ago
- Offensive Lua.☆221Updated 2 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Updated 2 years ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆93Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- ☆164Updated 2 years ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆117Updated 2 years ago