Vedant-Bhalgama / Access-Token-Manipulation-POCLinks
A repo containing the source code used in my video on Access Token Manipulation
☆10Updated 2 years ago
Alternatives and similar repositories for Access-Token-Manipulation-POC
Users that are interested in Access-Token-Manipulation-POC are comparing it to the libraries listed below
Sorting:
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆103Updated 2 years ago
- ☆55Updated 8 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆90Updated last year
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆40Updated last year
- Create Anti-Copy DRM Malware☆59Updated 10 months ago
- ☆59Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- ☆107Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated 2 years ago
- Utilities for obfuscating shellcode☆69Updated 3 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆105Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated last year
- This is a simple process injection made in C for Linux systems☆26Updated last year
- AMSI Bypass for powershell☆30Updated 3 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Encode shellcode into dictionary words for evasion and entropy reduction☆26Updated 7 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Windows Kernel Offensive Toolset☆124Updated this week
- C++ Staged Shellcode Loader with Evasion capabilities.☆93Updated 8 months ago
- Red Team Operation's Defense Evasion Technique.☆53Updated last year
- IAT Unhooking proof-of-concept☆29Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆36Updated 6 months ago
- maldev obviously☆26Updated last month