bruno-1337 / SeDebugPrivilege-ExploitLinks
Simple C++ PoC of SeDebugPrivilege Privesc
☆24Updated last year
Alternatives and similar repositories for SeDebugPrivilege-Exploit
Users that are interested in SeDebugPrivilege-Exploit are comparing it to the libraries listed below
Sorting:
- Create Anti-Copy DRM Malware☆58Updated 10 months ago
- Get SYSTEM via SeDebugPrivilege☆20Updated 3 years ago
- .bin file to shellcode convertor☆38Updated 11 months ago
- I have documented all of the AMSI patches that I learned till now☆73Updated 3 months ago
- C# havoc implant☆100Updated 2 years ago
- ☆52Updated 2 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆47Updated last month
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆122Updated 8 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆117Updated 2 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆54Updated 5 months ago
- CVE-2024-40711-exp☆42Updated 8 months ago
- Execute commands in other Sessions☆89Updated 10 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆92Updated 5 months ago
- Terminate AV/EDR leveraging BYOVD attack☆87Updated 3 months ago
- ☆57Updated 7 months ago
- SAM Dumping in C#☆48Updated 5 months ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 8 months ago
- ☆89Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆78Updated 2 years ago
- Active Directory certificate abuse☆39Updated 2 years ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 3 months ago
- ☆97Updated 9 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- ☆107Updated 4 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- .NET deserialization hunter☆77Updated 11 months ago
- A 64-bit, position-independent code reverse TCP shell for Windows — built in Rust.☆71Updated 2 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆95Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆105Updated last year
- Convert your shellcode into an ASCII string☆58Updated this week