exploitblizzard / iSCSI-UAC-Bypass
Abusing autoElevate - Fully Undetectable UAC Bypass exploit
☆11Updated 2 years ago
Alternatives and similar repositories for iSCSI-UAC-Bypass:
Users that are interested in iSCSI-UAC-Bypass are comparing it to the libraries listed below
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Beacon Object File implementation of Yaxser's Backstab☆14Updated 2 years ago
- ☆12Updated last month
- Quickly generate every payload type for each listener and optionally host via HTTP.☆21Updated 3 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆17Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆28Updated last year
- Citrix Phishlet☆22Updated 4 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated 10 months ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆27Updated 4 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆23Updated last year
- C# project to Reflectively load .Net assemblies in memory☆17Updated 8 months ago
- A simple rpc2socks alternative in pure Go.☆28Updated 7 months ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆14Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆19Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- ☆16Updated 4 months ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆83Updated 2 years ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆23Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- A simple website to act as a store for havoc modules and extensions☆25Updated last month
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- ☆23Updated 9 months ago
- A python port of CCob's ThreadlessInject☆26Updated last year