joren485 / PyWinPrivEsc
Windows Privilege Escalation
☆10Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for PyWinPrivEsc
- ☆22Updated 7 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- A simple reflective dll example☆18Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆14Updated 7 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆30Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 7 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆18Updated 7 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆14Updated 7 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- ☆53Updated 7 years ago
- Add my own POC to test Visual Studio trick to run code when building☆21Updated 7 years ago
- Simple C# reverse shell with shellcode and process injection☆40Updated 8 years ago
- powershell to hide process by kd.exe☆32Updated 3 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 7 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- ☆24Updated 7 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆42Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 6 years ago
- ☆16Updated 3 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago