esironal / win10cssLinks
Windows 10 simulation in HTML, CSS, and JavaScript
☆26Updated 7 years ago
Alternatives and similar repositories for win10css
Users that are interested in win10css are comparing it to the libraries listed below
Sorting:
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Updated 5 years ago
- Some random system tools for Windows☆114Updated 3 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Updated 2 years ago
- RunAsAttached is a program to locally run a new terminal as another user without spawning a new console window.☆47Updated 4 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆69Updated 2 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 4 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Updated 4 years ago
- code for the Proxy DLL example blog post☆62Updated 4 years ago
- ☆35Updated 2 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23Updated 5 years ago
- the most basic DLL ever to pop a cmd.☆24Updated 5 years ago
- Inject shellcode into a valid BMP/GIF image.☆33Updated 5 years ago
- Portable Executable launcher for Windows NT bypassing loader☆72Updated 4 months ago
- Sources Codes of many MSIL malwares☆24Updated 3 years ago
- RunAsAttached is a program to run a console as another user and keep new console attached to caller console. Support reverse shell mode (…☆75Updated 3 years ago
- ☆13Updated 11 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- A PNG file-smuggling tool and library!☆26Updated 2 years ago
- ☆59Updated 4 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆17Updated 5 years ago
- Run shellcode through InnoSetup code engine.☆74Updated 2 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 4 years ago
- ☆35Updated 2 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆62Updated 2 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆82Updated 3 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated 2 years ago
- Execute .Net assemblies using Rundll32.exe☆114Updated 4 years ago
- x64 Registration-Free In-Process COM Automation Server.☆51Updated 3 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Updated 4 years ago