fortra / Reversing-and-Exploiting-with-Free-Tools-Series
Tips and tricks on reversing and exploiting Windows using free and easy to get tools.
☆22Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Reversing-and-Exploiting-with-Free-Tools-Series
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆31Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆58Updated last year
- ☆37Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆66Updated 2 years ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆29Updated 2 months ago
- Identify and exploit leaked handles for local privilege escalation.☆105Updated last year
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆43Updated 2 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆68Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆79Updated 8 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆77Updated last year
- Windows internals and exploitation tricks☆93Updated 5 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆19Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆85Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆94Updated last year
- Project for identifying executables and DLLs vulnerable to environment-variable based DLL hijacking.☆56Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆51Updated 3 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆62Updated last year
- Tool for playing with Windows Access Token manipulation.☆51Updated last year
- ☆44Updated last year
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆24Updated 2 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆49Updated last year
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆32Updated last year
- ☆24Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆81Updated last year