alphaSeclab / persistence
Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.
☆98Updated 4 years ago
Alternatives and similar repositories for persistence
Users that are interested in persistence are comparing it to the libraries listed below
Sorting:
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆151Updated last year
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 3 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 4 years ago
- All Security Resource Collections Repos That I Published.☆124Updated 4 years ago
- ClamAV_0Day_exploit☆89Updated 5 years ago
- Shellcode injection POC using syscalls.☆116Updated 4 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆67Updated 6 years ago
- Resources About Shellcode☆211Updated 5 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆110Updated 5 years ago
- JScript RAT☆100Updated 4 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆94Updated 4 years ago
- PoC exploits for CVE-2020-17382☆114Updated 4 years ago
- ☆80Updated 3 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Updated 5 years ago
- Elevation Of Privileges Proof of Concept for Windows (win7-win10)☆32Updated 4 years ago
- ☆57Updated 6 years ago
- Cobalt Strike Aggressor Scripts☆143Updated 5 months ago
- ☆112Updated 4 years ago
- Hijack Printconfig.dll to execute shellcode☆98Updated 4 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- Poc for CVE-2019-1253☆156Updated 3 years ago
- gui uac bypass (netplwiz.exe)☆66Updated 5 years ago
- Domain Borrowing PoC☆212Updated 4 years ago
- 2020年发布到阿尔法实验室微信公众号的所有安全资讯汇总☆41Updated 4 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆142Updated 3 years ago
- Basic password spraying tool for internal tests and red teaming☆90Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆121Updated 4 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆225Updated last year
- Windows (ShadowMove) Socket Duplication☆83Updated 5 years ago