SleepTheGod / Windows
Windows And Ways To Break It
☆99Updated last year
Alternatives and similar repositories for Windows:
Users that are interested in Windows are comparing it to the libraries listed below
- ☆125Updated 7 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆143Updated 9 months ago
- ☆103Updated 6 months ago
- A shellcode injection tool showcasing various process injection techniques☆134Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- ☆84Updated 2 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆105Updated 2 months ago
- ☆137Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆120Updated 2 months ago
- Persistent Powershell backdoor tool {😈}☆116Updated 7 months ago
- ☆107Updated last year
- ☆64Updated 11 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆108Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆52Updated 6 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆66Updated last year
- ☆38Updated 3 months ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆92Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆174Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆72Updated last month
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 10 months ago
- Hades Basic Command & Control Server☆88Updated last year
- Different methods to get current username without using whoami☆174Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆159Updated last year
- Our Tips&Tricks☆113Updated last month
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Command and Control (C2) framework☆126Updated 11 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆172Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆52Updated this week
- quick and dirty proof-of-concept to hide shells in images☆49Updated 9 months ago