alphaSeclab / persistence
Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.
☆98Updated 4 years ago
Alternatives and similar repositories for persistence:
Users that are interested in persistence are comparing it to the libraries listed below
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 3 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 3 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆67Updated 6 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆94Updated 4 years ago
- Security Support Provider Interface☆46Updated 4 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆121Updated 4 years ago
- All Security Resource Collections Repos That I Published.☆123Updated 4 years ago
- ClamAV_0Day_exploit☆89Updated 5 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆122Updated 4 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated last year
- Resources About Shellcode☆210Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- Command and Control for C# Writing☆68Updated 2 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Updated 6 years ago
- ☆57Updated 6 years ago
- Shellcode injection POC using syscalls.☆117Updated 4 years ago
- JScript RAT☆99Updated 4 years ago
- CVE-2019-1458 Windows LPE Exploit☆135Updated 4 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- Use powershell to test Office-based persistence methods☆75Updated 3 years ago
- Elevation Of Privileges Proof of Concept for Windows (win7-win10)☆30Updated 4 years ago
- just test☆65Updated 2 years ago
- adding a backdooruser using win32api☆79Updated 4 years ago
- 2020年发布到阿尔法实验室微信公众号的所有安全资讯汇总☆41Updated 4 years ago
- a patched sshd for red team activities☆81Updated 3 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆92Updated 5 years ago
- sploit☆68Updated 5 years ago
- PoC exploits for CVE-2020-17382☆114Updated 4 years ago
- with metasploit☆63Updated 4 years ago