gnxbr / Fully-Undetectable-Techniques
☆367Updated 3 years ago
Alternatives and similar repositories for Fully-Undetectable-Techniques:
Users that are interested in Fully-Undetectable-Techniques are comparing it to the libraries listed below
- Create fake certs for binaries using windows binaries and the power of bat files☆553Updated 10 months ago
- A tool for generating fake code signing certificates or signing real ones☆895Updated last year
- Red Team C code repo☆525Updated 2 months ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆823Updated 3 years ago
- Encrypted PE Loader Generator☆539Updated 3 years ago
- PoC exploits I wrote. They're as is and I will not offer support☆274Updated 9 months ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆638Updated 5 years ago
- ☆660Updated 3 years ago
- some gadgets about windows process and ready to use :)☆582Updated last year
- Evade sysmon and windows event logging☆614Updated 4 years ago
- Generate obfuscated meterpreter shells☆228Updated 3 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆792Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automation☆614Updated 8 months ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆608Updated 2 years ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆351Updated last year
- A beacon generator using Cobalt Strike and a variety of tools.☆450Updated 3 years ago
- Penetration testing utility and antivirus assessment tool.☆315Updated last year
- A collection of tools to abuse chrome browser☆286Updated 4 years ago
- We developed GRAT2 Command & Control (C2) project for learning purpose.☆413Updated 4 years ago
- c++ fully undetected shellcode launcher ;)☆972Updated 3 years ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆377Updated 3 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆413Updated 3 years ago
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")☆367Updated last year
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆827Updated last year
- Exploit Code for CVE-2020-1472 aka Zerologon☆382Updated 4 years ago
- NTLM relaying for Windows made easy☆555Updated last year
- Windows Privilege Escalation from User to Domain Admin.☆1,362Updated 2 years ago
- ☆334Updated 3 years ago
- Hide your payload in DNS☆611Updated last year
- C# Script used for Red Team☆718Updated 3 years ago