bytecode77 / component-services-privilege-escalation
Component Services Volatile Environment LPE
☆11Updated 2 months ago
Alternatives and similar repositories for component-services-privilege-escalation:
Users that are interested in component-services-privilege-escalation are comparing it to the libraries listed below
- Display Languages Volatile Environment LPE☆10Updated 2 months ago
- TaskMgr Volatile Environment LPE☆13Updated 2 months ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 2 months ago
- Enter Product Key Volatile Environment LPE☆12Updated 2 months ago
- Performance Monitor Volatile Environment LPE☆18Updated 2 months ago
- Remote Assistance Volatile Environment LPE☆14Updated 2 months ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- Zerokit shared code☆16Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- ☆11Updated 5 years ago
- ☆23Updated 8 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- ☆16Updated 5 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Capture Webcam Reflective Dll☆8Updated 8 years ago
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated last year
- Zerokit server controller☆13Updated 5 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 2 years ago
- ☆15Updated last year
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- ☆13Updated 4 years ago
- ☆7Updated 5 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- ☆11Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago