hackerhouse-opensource / Gigabyte_ElevatePersist
Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming and performance PC's. A UAC elevation vulnerability exists that can be used for persistence in a novel fashion.
☆30Updated last year
Related projects: ⓘ
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated last year
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆30Updated 5 months ago
- ☆29Updated last year
- ☆25Updated this week
- Extension functionality for the NightHawk operator client☆26Updated 10 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆17Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆50Updated last year
- A simple rpc2socks alternative in pure Go.☆23Updated 2 months ago
- ☆38Updated this week
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- Ntdll Unhooking POC☆19Updated 2 years ago
- C# API for Nidhogg rootkit☆15Updated 4 months ago
- Bunch of BOF files☆21Updated 7 months ago
- old postex for grabbing a krbtgs for my current user☆28Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆14Updated last year
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆22Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆37Updated 9 months ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆15Updated 5 months ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆13Updated 2 months ago
- A way to extract tickets in case I need to purge and restore tickets on the fly.☆15Updated 4 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆30Updated 10 months ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆27Updated 2 years ago
- Remotely dump NT hashes through Windows Crash dumps☆25Updated 3 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆20Updated last month
- ☆48Updated last year
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆27Updated 3 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆29Updated 10 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated 11 months ago
- ☆24Updated 2 years ago
- ☆14Updated this week