Windows 7/2008 R2 EoP
☆13Feb 12, 2021Updated 5 years ago
Alternatives and similar repositories for RpcEndpointMapper
Users that are interested in RpcEndpointMapper are comparing it to the libraries listed below
Sorting:
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- 一款辅助探测Orderby注入漏洞的BurpSuite插件☆25Oct 19, 2021Updated 4 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- ☆14Aug 9, 2021Updated 4 years ago
- CVE-2020-1472 C++☆84Sep 2, 2022Updated 3 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- Alternative Mimikatz LSASS DUMPER☆14Apr 2, 2020Updated 5 years ago
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 6 years ago
- PoC for UUID shellcode execution using DInvoke☆155Mar 8, 2021Updated 5 years ago
- creddump bypass AV☆42Nov 6, 2020Updated 5 years ago
- ☆21Mar 16, 2021Updated 5 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- ☆74Jul 23, 2021Updated 4 years ago
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆57Mar 7, 2026Updated 2 weeks ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- 利用NTLM Hash读取Exchange邮件☆58May 13, 2023Updated 2 years ago
- Clear All Windows System Logs - AntiForensics☆53May 29, 2015Updated 10 years ago
- 创建服务持久化☆108Apr 26, 2021Updated 4 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆47Jun 15, 2022Updated 3 years ago
- PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。☆148Sep 1, 2021Updated 4 years ago
- Call NtCreateUserProcess directly as normal.☆77May 17, 2022Updated 3 years ago
- scrapy website Article and link ...☆15Dec 13, 2020Updated 5 years ago
- redteam Build platform☆19Nov 13, 2023Updated 2 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- 与反病毒软件老大哥们的打闹日常☆13Nov 8, 2018Updated 7 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- 这是一个直接取得系统权限的项目☆48Jun 24, 2020Updated 5 years ago
- Huorong Internet Security vulnerabilities 火绒安全软件漏洞☆112Apr 2, 2020Updated 5 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆17Sep 13, 2019Updated 6 years ago
- exp for CVE-2019-0887☆18Jan 15, 2021Updated 5 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆70Jun 11, 2021Updated 4 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- C++ Code Injector Class☆22Oct 2, 2020Updated 5 years ago
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆118Sep 29, 2020Updated 5 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆46Jun 24, 2023Updated 2 years ago