alphaSeclab / persistenceLinks
Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.
☆100Updated 5 years ago
Alternatives and similar repositories for persistence
Users that are interested in persistence are comparing it to the libraries listed below
Sorting:
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 4 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆95Updated 5 years ago
- PoC exploits for CVE-2020-17382☆115Updated 4 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated last year
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Updated 5 years ago
- gui uac bypass (netplwiz.exe)☆66Updated 5 years ago
- Command and Control for C# Writing☆68Updated 2 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 5 years ago
- JScript RAT☆101Updated 4 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- Exploits, Exploits, Exploits and more Exploits!☆33Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆59Updated 8 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- Clear All Windows System Logs - AntiForensics☆53Updated 10 years ago
- Elevation Of Privileges Proof of Concept for Windows (win7-win10)☆32Updated 4 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- Tool to test for existence of CVE-2020-8218☆22Updated 4 years ago
- Simple C implementation to perform shellcode process injection via win32 APIs☆62Updated 5 years ago
- Security Support Provider Interface☆47Updated 5 years ago
- ClamAV_0Day_exploit☆89Updated 5 years ago
- Shellcode injection POC using syscalls.☆116Updated 5 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- CVE-2019-0708 (BlueKeep)☆109Updated 5 years ago
- An example of a downloader written in NodeJS.☆24Updated 4 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 5 years ago
- adding a backdooruser using win32api☆80Updated 4 years ago
- ☆35Updated 2 years ago
- with metasploit☆63Updated 5 years ago