exploitblizzard / iSCSI-UAC-Bypass
Abusing autoElevate - Fully Undetectable UAC Bypass exploit
☆11Updated 2 years ago
Related projects: ⓘ
- Beacon Object File implementation of Yaxser's Backstab☆13Updated 2 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆22Updated last year
- A python port of CCob's ThreadlessInject☆26Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆17Updated 7 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆29Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 10 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆26Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆17Updated last year
- Yet, Another Packer/Loader☆25Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆21Updated 2 years ago
- C# project to Reflectively load .Net assemblies in memory☆15Updated 3 months ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated last year
- A way to extract tickets in case I need to purge and restore tickets on the fly.☆15Updated 4 months ago
- Items related to the RedELK workshop given at security conferences☆25Updated 11 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆79Updated last year
- in-process powershell runner for BRC4☆35Updated 10 months ago
- All my POC related to malware development☆10Updated 4 months ago
- Bunch of BOF files☆21Updated 7 months ago
- ☆24Updated 2 years ago
- ☆26Updated this week
- Example of using Sleep to create better named pipes.☆41Updated last year
- ☆22Updated this week
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆26Updated 4 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆19Updated last year
- ☆45Updated last year
- The Totally Legit Authentication Dialog☆12Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆39Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆29Updated 10 months ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago