alphaSeclab / persistenceLinks
Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.
☆100Updated 5 years ago
Alternatives and similar repositories for persistence
Users that are interested in persistence are comparing it to the libraries listed below
Sorting:
- A simple C implementation to decoded your shellcode and writes it directly to memory☆95Updated 4 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 4 years ago
- Shellcode injection POC using syscalls.☆116Updated 5 years ago
- Steal privileged token to obtain SYSTEM shell☆249Updated 4 years ago
- ClamAV_0Day_exploit☆89Updated 5 years ago
- JScript RAT☆101Updated 4 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆142Updated 3 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆68Updated 6 years ago
- All Security Resource Collections Repos That I Published.☆124Updated 5 years ago
- Resources About Shellcode☆213Updated 5 years ago
- PoC exploits for CVE-2020-17382☆115Updated 4 years ago
- ☆113Updated 4 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 4 years ago
- Another Go Shellcode Loader using Windows APIs☆140Updated 3 years ago
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆164Updated 5 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- Domain Borrowing PoC☆213Updated 4 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated last year
- Modular C2 framework aiming to ease post exploitation for red teamers.☆187Updated 3 years ago
- Cobalt Strike Aggressor Scripts☆143Updated 7 months ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Updated 6 years ago
- Poc for CVE-2019-1253☆156Updated 3 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago
- Command and Control for C# Writing☆68Updated 2 years ago
- a patched sshd for red team activities☆81Updated 3 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 4 years ago
- Security Support Provider Interface☆46Updated 5 years ago
- Linux x86_64 Process Injection Utility☆59Updated 4 years ago
- 破解CS4.0☆162Updated 5 years ago