Windows - Weaponizing privileged file writes with the Update Session Orchestrator service
☆405Jun 6, 2020Updated 5 years ago
Alternatives and similar repositories for UsoDllLoader
Users that are interested in UsoDllLoader are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Loads a custom dll in system32 via diaghub.☆85Mar 16, 2020Updated 6 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆232Feb 20, 2020Updated 6 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆118Dec 12, 2019Updated 6 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆333May 3, 2020Updated 5 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆812Jul 6, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆338Dec 23, 2021Updated 4 years ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆285May 14, 2020Updated 5 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆426Apr 22, 2021Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆220May 3, 2023Updated 2 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- Dump the memory of a PPL with a userland exploit☆890Jul 24, 2022Updated 3 years ago
- Just another Windows Process Injection☆409Aug 7, 2020Updated 5 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆826Mar 10, 2022Updated 4 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆810Aug 28, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Also known by Microsoft as Knifecoat☆1,151Dec 22, 2022Updated 3 years ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆677May 3, 2020Updated 5 years ago
- Windows Local Privilege Escalation from Service Account to System☆933Feb 23, 2020Updated 6 years ago
- ☆848Dec 13, 2022Updated 3 years ago
- Phantom DLL hollowing PoC☆372May 23, 2022Updated 3 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆355Dec 1, 2020Updated 5 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- Tool to create hidden registry keys.☆489Oct 23, 2019Updated 6 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Run shellcode from resource☆259Dec 13, 2020Updated 5 years ago
- Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services / Citrix / XenApp / XenDesktop☆1,251Nov 2, 2022Updated 3 years ago
- Reflective DLL loading of your favorite Golang program☆173Jan 27, 2020Updated 6 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,437Jul 20, 2024Updated last year
- Evade sysmon and windows event logging☆623Apr 8, 2020Updated 6 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- Remove API hooks from a Beacon process.☆283Sep 18, 2021Updated 4 years ago
- Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…☆595Jul 26, 2021Updated 4 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Miscellaneous Tools☆270Oct 29, 2020Updated 5 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆267Dec 19, 2019Updated 6 years ago
- Process Injection☆769Oct 24, 2021Updated 4 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆352Nov 14, 2019Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆813Dec 17, 2019Updated 6 years ago
- Privilege Escalation Via RpcSs svc☆180Dec 10, 2021Updated 4 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago