Vedant-Bhalgama / Access-Token-Manipulation-POC
A repo containing the source code used in my video on Access Token Manipulation
☆10Updated 2 years ago
Alternatives and similar repositories for Access-Token-Manipulation-POC:
Users that are interested in Access-Token-Manipulation-POC are comparing it to the libraries listed below
- malleable profile generator GUI for Havoc☆56Updated last year
- ☆54Updated 5 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Situational Awareness script to identify how and where to run implants☆49Updated 3 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆68Updated last year
- PowerShell script to generate ShellCode in various formats☆42Updated 6 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆81Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated last year
- Create Anti-Copy DRM Malware☆54Updated 7 months ago
- ☆59Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆33Updated 3 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆84Updated 5 months ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 3 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆102Updated last year
- in-process powershell runner for BRC4☆45Updated last year
- This is a simple process injection made in C for Linux systems☆26Updated last year
- A command and control framework.☆49Updated 3 months ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- Mythic C2 Agent written in x64 PIC C☆68Updated 2 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated last year
- ☆28Updated this week
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆44Updated 2 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- ☆34Updated 11 months ago
- ☆48Updated last year