exploitblizzard / iSCSI-UAC-BypassLinks
Abusing autoElevate - Fully Undetectable UAC Bypass exploit
☆11Updated 3 years ago
Alternatives and similar repositories for iSCSI-UAC-Bypass
Users that are interested in iSCSI-UAC-Bypass are comparing it to the libraries listed below
Sorting:
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- C# havoc implant☆101Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- HTML smuggling is not an evil, it can be useful☆13Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆65Updated 8 months ago
- ☆59Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆86Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆73Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆25Updated 11 months ago
- Just another ntdll unhooking using Parun's Fart technique☆75Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆22Updated 2 years ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆21Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆42Updated last year
- A repository with my code snippets for research/education purposes.☆51Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Updated last year
- Repository to gather the .NET malware I will be developing☆18Updated 5 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆24Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆75Updated 2 years ago
- Rewrite to fit my needs☆30Updated last year
- Excel Add In Payload Generator☆12Updated last year
- ☆34Updated 5 months ago
- A care package of useful bofs for red team engagments☆55Updated 8 months ago
- in-process powershell runner for BRC4☆47Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆84Updated last year
- ☆47Updated 2 years ago
- Sniffing files generator☆59Updated 6 months ago