gnxbr / Fully-Undetectable-Techniques
☆367Updated 3 years ago
Alternatives and similar repositories for Fully-Undetectable-Techniques:
Users that are interested in Fully-Undetectable-Techniques are comparing it to the libraries listed below
- PoC exploits I wrote. They're as is and I will not offer support☆274Updated 10 months ago
- Red Team C code repo☆531Updated 2 months ago
- ☆660Updated 3 years ago
- A tool for generating fake code signing certificates or signing real ones☆897Updated last year
- Encrypted PE Loader Generator☆540Updated 3 years ago
- Create fake certs for binaries using windows binaries and the power of bat files☆552Updated 11 months ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")☆368Updated 2 years ago
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆332Updated 3 years ago
- some gadgets about windows process and ready to use :)☆583Updated last year
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆820Updated 3 years ago
- Get file less command execution for lateral movement.☆612Updated 2 years ago
- Penetration testing utility and antivirus assessment tool.☆315Updated last year
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Updated 2 years ago
- c++ fully undetected shellcode launcher ;)☆974Updated 3 years ago
- Evade sysmon and windows event logging☆615Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆828Updated last year
- A collection of tools to abuse chrome browser☆286Updated 4 years ago
- Generate obfuscated meterpreter shells☆228Updated 3 years ago
- Microsoft » Windows 10 : Security Vulnerabilities☆904Updated last year
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆379Updated 3 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆638Updated 5 years ago
- ☆334Updated 3 years ago
- CVE-2020-0796 Remote Code Execution POC☆549Updated 4 years ago
- Shellcode injection technique. Given as C++ header, standalone Rust program or library.☆695Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆702Updated 3 years ago
- HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907☆361Updated 3 years ago
- CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆209Updated 4 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆382Updated 4 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆531Updated last year