gnxbr / Fully-Undetectable-Techniques
☆368Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Fully-Undetectable-Techniques
- Red Team C code repo☆513Updated last year
- A tool for generating fake code signing certificates or signing real ones☆876Updated last year
- Create fake certs for binaries using windows binaries and the power of bat files☆542Updated 7 months ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆821Updated 3 years ago
- PoC exploits I wrote. They're as is and I will not offer support☆274Updated 6 months ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆412Updated 3 years ago
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")☆353Updated last year
- ☆652Updated 2 years ago
- c++ fully undetected shellcode launcher ;)☆966Updated 3 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆832Updated 2 years ago
- A collection of tools to abuse chrome browser☆285Updated 3 years ago
- Penetration testing utility and antivirus assessment tool.☆313Updated last year
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆816Updated last year
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆409Updated 3 years ago
- Encrypted PE Loader Generator☆538Updated 3 years ago
- Generate obfuscated meterpreter shells☆225Updated 3 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆791Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆791Updated 2 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆519Updated 8 months ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆377Updated 3 years ago
- Get file less command execution for lateral movement.☆601Updated 2 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆382Updated 4 years ago
- Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527☆330Updated 3 years ago
- Evade sysmon and windows event logging☆611Updated 4 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆606Updated 2 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆635Updated 4 years ago
- some gadgets about windows process and ready to use :)☆573Updated last year