gellin / TeamViewer_Permissions_Hook_V1View external linksLinks
A proof of concept injectable C++ dll, that uses naked inline hooking and direct memory modification to change your TeamViewer permissions.
☆309Dec 7, 2017Updated 8 years ago
Alternatives and similar repositories for TeamViewer_Permissions_Hook_V1
Users that are interested in TeamViewer_Permissions_Hook_V1 are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept exploits for CVE-2017-11882☆496Nov 29, 2017Updated 8 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- tool to extract passwords from TeamViewer memory using Frida☆464Jul 17, 2018Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- Powershell VNC injector☆341Jun 29, 2020Updated 5 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆359Updated this week
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,448Nov 20, 2025Updated 2 months ago
- A tool to elevate privilege with Windows Tokens☆1,055Oct 6, 2023Updated 2 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- XFLTReaT tunnelling framework☆329Jan 16, 2020Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Feb 10, 2019Updated 7 years ago
- ☆127Apr 8, 2019Updated 6 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Jan 12, 2023Updated 3 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- ☆164May 18, 2018Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆217Feb 2, 2018Updated 8 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- ☆30May 23, 2017Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- ☆409Mar 1, 2017Updated 8 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆394Oct 11, 2017Updated 8 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- ☆230May 10, 2018Updated 7 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆322Jun 5, 2017Updated 8 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆323Feb 7, 2018Updated 8 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆742Mar 17, 2019Updated 6 years ago
- Working POC of Mikrotik exploit from Vault 7 CIA Leaks☆662Sep 20, 2022Updated 3 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago