bruno-1337 / SeDebugPrivilege-ExploitLinks
Simple C++ PoC of SeDebugPrivilege Privesc
☆25Updated last year
Alternatives and similar repositories for SeDebugPrivilege-Exploit
Users that are interested in SeDebugPrivilege-Exploit are comparing it to the libraries listed below
Sorting:
- ☆52Updated 3 years ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆87Updated 3 months ago
- Create Anti-Copy DRM Malware☆64Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆79Updated 6 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆57Updated 8 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆106Updated 2 years ago
- ☆81Updated last year
- Automated .NET AppDomain hijack payload generation☆127Updated 7 months ago
- .NET deserialization hunter☆79Updated last year
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dump☆149Updated 11 months ago
- Abuse leaked token handles.☆132Updated last year
- ☆136Updated last year
- Local & remote Windows DLL Proxying☆165Updated last year
- Convert your shellcode into an ASCII string☆114Updated 2 months ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆88Updated 2 years ago
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆41Updated last year
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Updated 3 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Execute commands in other Sessions☆90Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆142Updated 8 months ago
- ☆18Updated 8 months ago
- ☆109Updated 6 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆51Updated 4 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆142Updated 5 months ago
- ☆71Updated 6 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆98Updated last year
- Offensive Windows Kernel Toolset☆131Updated 2 months ago