bruno-1337 / SeDebugPrivilege-ExploitLinks
Simple C++ PoC of SeDebugPrivilege Privesc
☆26Updated last year
Alternatives and similar repositories for SeDebugPrivilege-Exploit
Users that are interested in SeDebugPrivilege-Exploit are comparing it to the libraries listed below
Sorting:
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆108Updated 2 years ago
- Create Anti-Copy DRM Malware☆69Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆153Updated last year
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆89Updated 7 months ago
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆41Updated last year
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆53Updated 7 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 2 years ago
- ☆55Updated 3 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆63Updated 11 months ago
- Abuse leaked token handles.☆134Updated 2 years ago
- Terminate AV/EDR leveraging BYOVD attack☆102Updated 9 months ago
- .bin file to shellcode convertor☆39Updated last year
- A C# port from Invoke-GhostTask☆119Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆88Updated 9 months ago
- Extract SAM and SYSTEM using Volume Shadow Copy (VSS) API. With multiple exfiltration options and XOR obfuscation☆231Updated this week
- Automated .NET AppDomain hijack payload generation☆130Updated 10 months ago
- To audit the security of read-only domain controllers☆117Updated 2 years ago
- Local & remote Windows DLL Proxying☆169Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆118Updated last year
- ☆92Updated last year
- ☆109Updated 10 months ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Updated 3 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- ☆82Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆126Updated last year
- Execute commands in other Sessions☆91Updated last year
- Convert your shellcode into an ASCII string☆125Updated 5 months ago
- ☆67Updated 2 years ago
- ☆136Updated last year
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆149Updated 9 months ago