esironal / win10css
Windows 10 simulation in HTML, CSS, and JavaScript
☆26Updated 6 years ago
Alternatives and similar repositories for win10css:
Users that are interested in win10css are comparing it to the libraries listed below
- Some random system tools for Windows☆111Updated 2 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Updated 3 years ago
- A post-processing script for TinyTracer☆38Updated 2 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆52Updated 3 years ago
- ☆12Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆38Updated 4 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- ☆12Updated 3 years ago
- Runs programs as TrustedInstaller☆49Updated 5 years ago
- Decrypt Wireless Passwords On Windows☆14Updated 4 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆22Updated 4 years ago
- code for the Proxy DLL example blog post☆61Updated 3 years ago
- Native Powers Talk demos☆14Updated last year
- API Hammering with C++20☆45Updated 2 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆22Updated 2 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Updated 2 years ago
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Updated 10 years ago
- Execute .Net assemblies using Rundll32.exe☆110Updated 4 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆33Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- Portable Executable launcher for Windows NT bypassing loader☆69Updated 2 months ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated last year
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Updated 6 months ago
- ☆33Updated 2 years ago
- Forward TCP traffic, DNS happens at time of the connection☆39Updated 9 years ago