cybersectroll / TrollUAC
☆131Updated 3 months ago
Related projects: ⓘ
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆167Updated 6 months ago
- ☆131Updated 3 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆83Updated 8 months ago
- Execute shellcode files with rundll32☆171Updated 7 months ago
- Spoofing desktop login applications with WinForms and WPF☆169Updated 7 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆139Updated 4 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 9 months ago
- Weaponized HellsGate/SigFlip☆188Updated last year
- ☆84Updated 4 months ago
- ☆142Updated 11 months ago
- ☆119Updated last month
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆151Updated 8 months ago
- Local & remote Windows DLL Proxying☆158Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆59Updated 3 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆110Updated 3 months ago
- Just another C2 Redirector using CloudFlare.☆76Updated 4 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆193Updated 3 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 11 months ago
- ☆172Updated 9 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆142Updated 3 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆91Updated last year
- An App Domain Manager Injection DLL PoC on steroids☆155Updated 9 months ago
- Find DLLs with RWX section☆74Updated last year
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆83Updated 11 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆79Updated 2 months ago
- ☆113Updated 11 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆171Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆94Updated last week
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆120Updated last week
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆136Updated last month