connormcgarr / Kernel-Escalation-of-Privileges-Payloads
NT AUTHORITY\SYSTEM
☆38Updated 4 years ago
Alternatives and similar repositories for Kernel-Escalation-of-Privileges-Payloads:
Users that are interested in Kernel-Escalation-of-Privileges-Payloads are comparing it to the libraries listed below
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- ☆23Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆37Updated 3 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated 11 months ago
- ☆31Updated 4 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- ☆21Updated 4 years ago
- 2022 Updated Kernelmode-Code☆31Updated 9 months ago
- ☆37Updated 3 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Enabled / Disable LSA Protection via BYOVD☆65Updated 3 years ago
- ☆10Updated 3 years ago
- Sysmon shenanigans☆66Updated 4 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆33Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- Example for PagedOut!☆24Updated 5 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 2 years ago
- Just another casual shellcode native loader☆24Updated 2 years ago
- Process Hollowing demonstration & explanation☆33Updated 3 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago