Research into WinSxS binaries and finding hijackable paths
☆30Dec 7, 2025Updated 2 months ago
Alternatives and similar repositories for HelloJackHunter
Users that are interested in HelloJackHunter are comparing it to the libraries listed below
Sorting:
- GitHubApi CVE Poc监控工具☆14Jan 23, 2026Updated last month
- ☆92May 15, 2024Updated last year
- TokenCert☆102Nov 15, 2024Updated last year
- kill windows log☆45Mar 26, 2024Updated last year
- lineadd 渗透测试字典管理工具, 让字典管理生活轻松一点。Penetration test dictionary management tool, make dictionary management life a little easier.☆27Aug 19, 2023Updated 2 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- 免杀☆12May 6, 2024Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- This program detects if any security software (AV, EDR, XDR, firewall, etc.) is running on the system. The program searches the list of r…☆50Jan 13, 2026Updated last month
- Using LNK files and user input simulation to start processes under explorer.exe☆34Sep 21, 2024Updated last year
- 反取证程序,类似usbkill☆11Apr 22, 2023Updated 2 years ago
- 读取dump向日葵&Todesk进程的文件获得连接信息☆17Sep 27, 2024Updated last year
- clfs CVE 的一些 POC 收集☆16Oct 27, 2022Updated 3 years ago
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- 使用Go语言开发的Linux权限审计工具☆13Jun 15, 2022Updated 3 years ago
- NTLM/Negotiate authentication over HTTP that supports Pass The Hash Mode (PtH)☆17Sep 13, 2024Updated last year
- Manual Map Your Files, Bypass 100% Runtime.☆11Aug 31, 2022Updated 3 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆31May 11, 2024Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Dec 7, 2025Updated 2 months ago
- Test AMSI Provider implementation in C#☆42Dec 18, 2024Updated last year
- Call the CLR interface from memory to load powershell, process-less powershell☆15Sep 7, 2023Updated 2 years ago
- SSDG 基于Social规则的账号|密码|口令字典生成工具☆16Jan 10, 2025Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- VBA Macro obfuscator☆13Sep 20, 2020Updated 5 years ago
- burpsuite 插件 根据配置简单规则编辑通过的HTTP流量包☆14Feb 27, 2023Updated 3 years ago
- Load a dynamic library from memory by modifying the native Windows loader☆285Jun 18, 2025Updated 8 months ago
- ☆37Jun 9, 2023Updated 2 years ago
- Golang implement winrm client with pass the hash☆32Apr 29, 2024Updated last year
- 一种通过进程注入实现强制关闭部分杀软进程的方法(以360安全卫士和360杀毒为例)