jpginc / xbapAppWhitelistBypassPOC
☆27Updated 5 years ago
Related projects: ⓘ
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 4 years ago
- Execute Shellcode And Other Goodies From MMC☆12Updated 9 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 4 years ago
- ☆11Updated 7 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- ☆15Updated 4 years ago
- A reduced functionality cli client for the imdisk ram disk driver. To be used through a backdoor like meterpreter☆22Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 9 years ago
- module for certexfil☆15Updated 2 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Updated 6 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆45Updated 3 years ago
- CVE-2020-0688☆10Updated 4 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 4 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆25Updated 4 years ago
- Persistent through COM Hijacking☆20Updated 5 years ago
- ☆38Updated this week
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 5 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆16Updated 3 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆24Updated 5 years ago
- CVE-2020-5837 exploit☆40Updated 4 years ago
- Decrypt Wireless Passwords On Windows☆14Updated 4 years ago
- Windows Shellcode Testing Utility to Run Shellcode From A File☆11Updated 4 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago
- Spoof parent process ID☆13Updated 5 years ago
- ☆11Updated 4 years ago
- Hide Mimikatz From Process Lists☆17Updated 9 years ago
- ☆26Updated this week
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆14Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 6 years ago