bytecode77 / component-services-privilege-escalationLinks
Component Services Volatile Environment LPE
☆12Updated 2 weeks ago
Alternatives and similar repositories for component-services-privilege-escalation
Users that are interested in component-services-privilege-escalation are comparing it to the libraries listed below
Sorting:
- Display Languages Volatile Environment LPE☆11Updated 2 weeks ago
- Sysprep Volatile Environment LPE (2017)☆15Updated 2 weeks ago
- Enter Product Key Volatile Environment LPE☆13Updated 2 weeks ago
- TaskMgr Volatile Environment LPE☆14Updated 2 weeks ago
- Remote Assistance Volatile Environment LPE☆15Updated 2 weeks ago
- Performance Monitor Volatile Environment LPE☆18Updated 2 weeks ago
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- ☆23Updated 9 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Several self-defense shellcodes☆22Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- PoC code from blog☆16Updated 5 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Access windows machine remotely on HTTP☆12Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Zerokit shared code☆17Updated 6 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 10 years ago
- ☆7Updated 6 years ago
- Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)☆15Updated 6 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- ☆11Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 7 years ago
- ☆14Updated 5 years ago
- ☆17Updated 6 years ago
- Zerokit server controller☆14Updated 6 years ago