Vedant-Bhalgama / Access-Token-Manipulation-POC
A repo containing the source code used in my video on Access Token Manipulation
☆10Updated 2 years ago
Alternatives and similar repositories for Access-Token-Manipulation-POC
Users that are interested in Access-Token-Manipulation-POC are comparing it to the libraries listed below
Sorting:
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Create Anti-Copy DRM Malware☆56Updated 8 months ago
- ☆12Updated 4 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- This is a simple process injection made in C for Linux systems☆26Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆34Updated 5 months ago
- Detect userland hooks placed by AV/EDR☆27Updated last year
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆46Updated 4 months ago
- IAT Unhooking proof-of-concept☆29Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- ☆59Updated last year
- ☆36Updated last year
- Red Team Operation's Defense Evasion Technique.☆52Updated 11 months ago
- ☆55Updated 6 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Utilities for obfuscating shellcode☆66Updated 2 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated last year
- Situational Awareness script to identify how and where to run implants☆49Updated 5 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆90Updated 7 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- ☆69Updated 2 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆81Updated this week
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- ☆34Updated last month
- Offensive Assembly code snippets.☆12Updated last year