nccgroup / WindowsDACLEnumProjectLinks
A collection of tools to enumerate and analyse Windows DACLs
☆109Updated 10 years ago
Alternatives and similar repositories for WindowsDACLEnumProject
Users that are interested in WindowsDACLEnumProject are comparing it to the libraries listed below
Sorting:
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆100Updated 7 years ago
- a program to detect reflective dll injection on a live machine☆76Updated 10 years ago
- ☆53Updated 7 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆73Updated 5 years ago
- POSHSPY backdoor code☆45Updated 8 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆139Updated 8 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 8 years ago
- ☆55Updated 8 years ago
- Process reimaging proof of concept code☆97Updated 6 years ago
- ☆45Updated 7 years ago
- Shim database persistence (Fin7 TTP)☆37Updated 5 years ago
- Reflective Polymorphism☆108Updated 7 years ago
- ☆25Updated 9 years ago
- ☆65Updated 9 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- ☆62Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆95Updated 6 years ago
- InsecurePowerShell is PowerShell with some security features removed.☆104Updated 8 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Updated 6 years ago
- Community maintained list of most popular HIPS service and process names on a Windows Platform.☆43Updated 3 years ago
- few months old but better than nothing☆58Updated 3 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆158Updated 6 years ago
- PoC dlls for Task Scheduler COM Hijacking☆95Updated 9 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Updated 4 years ago
- Windows Stagers to circumvent restrictive network environments☆68Updated last year
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Updated 8 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆91Updated 11 years ago