Sysprep Volatile Environment LPE (2017)
☆16Jun 28, 2025Updated 7 months ago
Alternatives and similar repositories for sysprep-privilege-escalation
Users that are interested in sysprep-privilege-escalation are comparing it to the libraries listed below
Sorting:
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 7 months ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 7 months ago
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 7 months ago
- Remote Assistance Volatile Environment LPE☆15Jun 28, 2025Updated 7 months ago
- Performance Monitor Volatile Environment LPE☆18Jun 28, 2025Updated 7 months ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 7 months ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Jun 28, 2025Updated 7 months ago
- Raycaster (C++)☆23Jun 28, 2025Updated 7 months ago
- Software Rasterizer (C++)☆40Jan 1, 2026Updated last month
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 3 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- User-mode program parsing logs created by HyperPlatform☆18Aug 15, 2016Updated 9 years ago
- C-based Reverse Shell that uses CMD or PowerShell☆16Aug 15, 2020Updated 5 years ago
- Simple command line version of Sysinternals WinObj. Currently just lists object names and types given an object manager directory.☆22Sep 4, 2023Updated 2 years ago
- Framework for C# development☆70Feb 14, 2026Updated last week
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- A bots loader for CVE-2022-29464 with multithreading☆11Dec 29, 2025Updated last month
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- firewall for windows 8☆18Dec 16, 2013Updated 12 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆14Mar 31, 2016Updated 9 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 8 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- T00ls.Net 2017第一期线下沙龙(北京)PPT合集☆20May 24, 2017Updated 8 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago
- Exploit web-vulnerabilities☆23Apr 9, 2019Updated 6 years ago
- Diff tool for comparing export tables in PE images☆24Mar 4, 2020Updated 5 years ago
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated 10 months ago
- Simple program for static hooking dynamic libraries in executable application☆24Jan 15, 2014Updated 12 years ago
- Example implementations of each attribute available in Nunit2 unit Testing Framework using C# .NET.☆15Jun 1, 2018Updated 7 years ago
- My little precious collection of Linux 4.x kernel rootkits☆28Jul 27, 2024Updated last year
- SS-RAT (Schwarze-Sonne-Remote-Access-Trojan)☆28Mar 3, 2017Updated 8 years ago
- ☆30Mar 2, 2023Updated 2 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- safe_tools☆26Nov 27, 2017Updated 8 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- Static library and headers for linking your software with ntdll.dll☆37Dec 16, 2019Updated 6 years ago
- anti-virtualmachine with C!☆23Apr 10, 2016Updated 9 years ago
- Gozi-MBR-rootkit Bootkit Modified☆69Oct 25, 2016Updated 9 years ago