A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows services.
☆16Sep 4, 2015Updated 10 years ago
Alternatives and similar repositories for SneakyService
Users that are interested in SneakyService are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- A more full featured C# API for connecting to and managing Active Directory (AD) and Lightweight Directory (AD-LDS) instances, complete w…☆25Sep 8, 2015Updated 10 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PowerShell script to report the membership of Exchange RBAC role groups☆10Oct 21, 2018Updated 7 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- A pattern for a self-installing Windows service in C# with the unstoppable attributes in C#.☆66Jan 19, 2019Updated 7 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 11 months ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- An implementation of PSExec in C#☆337Dec 1, 2020Updated 5 years ago
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆22Feb 11, 2025Updated last year
- .NET tool for enumeration processes and dumping memory.☆57Apr 4, 2019Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Detect malicious domain, Blablablablabla☆27Jan 8, 2017Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆10Dec 16, 2017Updated 8 years ago
- A pattern for client/server communication via Named Pipes via C#☆98Aug 8, 2018Updated 7 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆53Jan 17, 2016Updated 10 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 7 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆139Aug 3, 2017Updated 8 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆94Apr 27, 2019Updated 6 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- REST PKCS11 gateway to leverage an HSM.☆16Oct 14, 2024Updated last year
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Powershell script for discovering credit cards on a Windows machine☆32Jan 28, 2016Updated 10 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago